๐Ÿ” CVE Alert

CVE-2022-49518

UNKNOWN 0.0

ASoC: SOF: ipc3-topology: Correct get_control_data for non bytes payload

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc3-topology: Correct get_control_data for non bytes payload It is possible to craft a topology where sof_get_control_data() would do out of bounds access because it expects that it is only called when the payload is bytes type. Confusingly it also handles other types of controls, but the payload parsing implementation is only valid for bytes. Fix the code to count the non bytes controls and instead of storing a pointer to sof_abi_hdr in sof_widget_data (which is only valid for bytes), store the pointer to the data itself and add a new member to save the size of the data. In case of non bytes controls we store the pointer to the chanv itself, which is just an array of values at the end. In case of bytes control, drop the wrong cdata->data (wdata[i].pdata) check against NULL since it is incorrect and invalid in this context. The data is pointing to the end of cdata struct, so it should never be null.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7006d20e5e9d25c079a82e2bc0ea7e292fdea6e6 < 896b03bb7c7010042786cfae2115083d4c241dd3 7006d20e5e9d25c079a82e2bc0ea7e292fdea6e6 < a962890a5a3cce903ff7c7a19fadee63ed9efdc7
Linux / Linux
5.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/896b03bb7c7010042786cfae2115083d4c241dd3 git.kernel.org: https://git.kernel.org/stable/c/a962890a5a3cce903ff7c7a19fadee63ed9efdc7