CVE-2022-50439

Source
https://cve.org/CVERecord?id=CVE-2022-50439
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50439.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50439
Downstream
Related
Published
2025-10-01T11:42:15.829Z
Modified
2026-04-11T12:44:57.337291Z
Summary
ASoC: mediatek: mt8173: Enable IRQ when pdata is ready
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8173: Enable IRQ when pdata is ready

If the device does not come straight from reset, we might receive an IRQ before we are ready to handle it.

[ 2.334737] Unable to handle kernel read from unreadable memory at virtual address 00000000000001e4 [ 2.522601] Call trace: [ 2.525040] regmapread+0x1c/0x80 [ 2.528434] mt8173afeirqhandler+0x40/0xf0 ... [ 2.598921] start_kernel+0x338/0x42c

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50439.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ee0bcaff109f36d582df9851f204c9a5eb79c028
Fixed
190685ff4ee03eef8f12c71d8f626e414fa078a9
Fixed
57491967ad8f865a9a81d08c36b26facd14d84e5
Fixed
27e7cf595d4a9fea9d3906b47d0faa87896beeb3
Fixed
9ce9c78a2bdbc9a014e7102a35834310c28528b9
Fixed
77c6b6be7e80ca4a4d4b66b63fd5bb48ccefdd5a
Fixed
4cbb264d4e9136acab2c8fd39e39ab1b1402b84b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50439.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50439.json"