CVE-2023-54059
Description
In the Linux kernel, the following vulnerability has been resolved:
soc: mediatek: mtk-svs: Enable the IRQ later
If the system does not come from reset (like when is booted via kexec()), the peripheral might triger an IRQ before the data structures are initialised.
[ 0.227710] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000f08 [ 0.227913] Call trace: [ 0.227918] svs_isr+0x8c/0x538
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing IRQ initialization ordering in the Mediatek CPU voltage scaling driver can crash kernels booted via kexec() due to a NULL dereference.
Root
Cause
The Mediatek Smart Voltage Scaling (SVS) driver in the Linux kernel enables its interrupt handler before the necessary data structures are fully initialised. When the system is booted via kexec() (not from a full reset), the hardware peripheral may already be active and trigger an IRQ immediately upon registration. Because the driver's internal state is still being set up, the interrupt service routine svs_isr dereferences a NULL pointer, leading to a kernel panic [1].
Attack
Vector
This vulnerability is triggered during a specific boot path — kexec-based boot — and does not require any special privileges or network access. An attacker who can control the kernel image loaded via kexec could deliberately cause the crash. However, in normal operation, the bug manifests as a reliability issue rather than a remotely exploitable flaw.
Impact
The NULL pointer dereference results in an immediate kernel panic (Unable to handle kernel NULL pointer dereference), causing a denial of service (system crash) at boot time. No privilege escalation or data leakage is described in the advisory [1].
Mitigation
The fix, applied in the Linux kernel stable tree, moves the interrupt enabling to after the SVS data structures are fully initialised, ensuring the handler never sees incomplete state [1]. Users running kernels prior to this patch – especially on systems using kexec – are vulnerable to boot-time crashes.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
36b99ebd30d6566ea96629bbcb74952aba6c3Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.