
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-49427) was discovered in the IOMMU MediaTek driver. After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the IOMMU clock is controlled by the runtime callback, but the clock control in mtk_iommu_remove was not properly updated, leading to potential system warnings and stability issues (Kernel Git).
The vulnerability occurs in the mtk_iommu_remove function where clk_disable_unprepare(data->bclk) is called unnecessarily since the clock is already managed by runtime callbacks. This causes a warning when attempting to disable an already disabled clock, as demonstrated when executing 'echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind' (Kernel Git).
When triggered, this vulnerability results in system warnings and potential stability issues. The issue manifests when unbinding the IOMMU device, causing kernel warnings about attempting to disable an already disabled clock (Kernel Git).
The issue has been fixed by removing the redundant clk_disable_unprepare call in mtk_iommu_remove function. The fix was implemented in commit 98df772bdd1c4ce717a26289efea15cbbe4b64ed and has been backported to various stable kernel versions (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."