We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50016

ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 230f646085d17a008b609eb8fe8befb8811868f0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before acacd9eefd0def5a83244d88e5483b5f38ee7287
affected

Default status
affected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/230f646085d17a008b609eb8fe8befb8811868f0

git.kernel.org/...c/acacd9eefd0def5a83244d88e5483b5f38ee7287

cve.org (CVE-2022-50016)

nvd.nist.gov (CVE-2022-50016)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50016

Support options

Helpdesk Chat, Email, Knowledgebase