CVE-2022-50016

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Nov 2025, 17:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
References () https://git.kernel.org/stable/c/230f646085d17a008b609eb8fe8befb8811868f0 - () https://git.kernel.org/stable/c/230f646085d17a008b609eb8fe8befb8811868f0 - Patch
References () https://git.kernel.org/stable/c/acacd9eefd0def5a83244d88e5483b5f38ee7287 - () https://git.kernel.org/stable/c/acacd9eefd0def5a83244d88e5483b5f38ee7287 - Patch
First Time Linux linux Kernel
Linux

Information

Published : 2025-06-18 11:15

Updated : 2025-11-14 17:06


NVD link : CVE-2022-50016

Mitre link : CVE-2022-50016

CVE.ORG link : CVE-2022-50016


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference