Home

Description

In the Linux kernel, the following vulnerability has been resolved: soc: mediatek: mtk-svs: Enable the IRQ later If the system does not come from reset (like when is booted via kexec()), the peripheral might triger an IRQ before the data structures are initialised. [ 0.227710] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000f08 [ 0.227913] Call trace: [ 0.227918] svs_isr+0x8c/0x538

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2026-01-06 | Assigner Linux

Product status

Default status
unaffected

681a02e9500073cd8b9c25a04f06166254b5a879 (git) before 6b99ebd30d65ee5ab8e8dd1d378550911eff5e4f
affected

681a02e9500073cd8b9c25a04f06166254b5a879 (git) before 66ea96629bbccf1b483be506f3daff754069cdd3
affected

681a02e9500073cd8b9c25a04f06166254b5a879 (git) before b74952aba6c3f47e7f2c5165abaeefa44c377140
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.18 (semver)
unaffected

6.2.5 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/6b99ebd30d65ee5ab8e8dd1d378550911eff5e4f

git.kernel.org/...c/66ea96629bbccf1b483be506f3daff754069cdd3

git.kernel.org/...c/b74952aba6c3f47e7f2c5165abaeefa44c377140

cve.org (CVE-2023-54059)

nvd.nist.gov (CVE-2023-54059)

Download JSON