We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50015

ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 48945246cf802b9866f3a821103f1a7a196baf68
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 499cc881b09c8283ab5e75b0d6d21cb427722161
affected

Default status
affected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/48945246cf802b9866f3a821103f1a7a196baf68

git.kernel.org/...c/499cc881b09c8283ab5e75b0d6d21cb427722161

cve.org (CVE-2022-50015)

nvd.nist.gov (CVE-2022-50015)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50015

Support options

Helpdesk Chat, Email, Knowledgebase