We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50015

ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-19 | Assigner Linux

Product status

Default status
unaffected

6e9cde974863dc9d9c6cdb178f625e410c5be3d0 before 48945246cf802b9866f3a821103f1a7a196baf68
affected

6e9cde974863dc9d9c6cdb178f625e410c5be3d0 before 499cc881b09c8283ab5e75b0d6d21cb427722161
affected

Default status
affected

5.2
affected

Any version before 5.2
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/48945246cf802b9866f3a821103f1a7a196baf68

git.kernel.org/...c/499cc881b09c8283ab5e75b0d6d21cb427722161

cve.org (CVE-2022-50015)

nvd.nist.gov (CVE-2022-50015)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50015

Support options

Helpdesk Chat, Email, Knowledgebase