๐Ÿ” CVE Alert

CVE-2022-50016

UNKNOWN 0.0

ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
273020522ef62361c5d86eebe45a72418ed8dea4 < 230f646085d17a008b609eb8fe8befb8811868f0 273020522ef62361c5d86eebe45a72418ed8dea4 < acacd9eefd0def5a83244d88e5483b5f38ee7287
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/230f646085d17a008b609eb8fe8befb8811868f0 git.kernel.org: https://git.kernel.org/stable/c/acacd9eefd0def5a83244d88e5483b5f38ee7287