-
CVE-2022-50439
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:35
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8173: Enable IRQ when pdata is ready If the device does not come straight from reset, we might receive an IRQ before we are ready to handle it. [ 2.334737] Unable to handle kernel read from unreadable memory at virtual address 00000000000001e4 [ 2.522601] Call trace: [ 2.525040] regmap_read+0x1c/0x80 [ 2.528434] mt8173_afe_irq_handler+0x40/0xf0 ... [ 2.598921] start_kernel+0x338/0x42c
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
190685ff4ee03eef8f12c71d8f626e414fa078a9
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
Version <
57491967ad8f865a9a81d08c36b26facd14d84e5
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
Version <
27e7cf595d4a9fea9d3906b47d0faa87896beeb3
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
Version <
9ce9c78a2bdbc9a014e7102a35834310c28528b9
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
Version <
77c6b6be7e80ca4a4d4b66b63fd5bb48ccefdd5a
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
Version <
4cbb264d4e9136acab2c8fd39e39ab1b1402b84b
Version
ee0bcaff109f36d582df9851f204c9a5eb79c028
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version <
4.2
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|