CVE-2022-50115
ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes We have sanity checks for byte controls and if any of the fail the locally allocated scontrol->ipc_control_data is freed up, but not set to NULL. On a rollback path of the error the higher level code will also try to free the scontrol->ipc_control_data which will eventually going to lead to memory corruption as double freeing memory is not a good thing.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jun 18, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
b5cee8feb1d482a9d07b677f4f2f9565bacda53e < 8463986b54295e6b65ddf2b7c65627d01ce7643b b5cee8feb1d482a9d07b677f4f2f9565bacda53e < c2eddfcafcffaf1b9245ea0dde9143bbfb47d5d1 b5cee8feb1d482a9d07b677f4f2f9565bacda53e < d5bd47f3ca124058a8e87eae4508afeda2132611
Linux / Linux
5.18