CVE-2023-54059Linux vulnerability

7 documents6 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: soc: mediatek: mtk-svs: Enable the IRQ later If the system does not come from reset (like when is booted via kexec()), the peripheral might triger an IRQ before the data structures are initialised. [ 0.227710] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000f08 [ 0.227913] Call trace: [ 0.227918] svs_isr+0x8c/0x538

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.1.18+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux681a02e9500073cd8b9c25a04f06166254b5a8796b99ebd30d65ee5ab8e8dd1d378550911eff5e4f+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54059: In the Linux kernel, the following vulnerability has been resolved: soc: mediatek: mtk-svs: Enable the IRQ later If the system does not come from rese2025-12-24
GHSA
GHSA-f7rw-fph7-g6vv: In the Linux kernel, the following vulnerability has been resolved: soc: mediatek: mtk-svs: Enable the IRQ later If the system does not come from re2025-12-24
OSV
soc: mediatek: mtk-svs: Enable the IRQ later2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: soc: mediatek: mtk-svs: Enable the IRQ later2025-12-24
Debian
CVE-2023-54059: linux - In the Linux kernel, the following vulnerability has been resolved: soc: mediat...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54059 Impact, Exploitability, and Mitigation Steps | Wiz