CVE-2022-49772

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and snd_BUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

07 Nov 2025, 18:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10 - () https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10 - Patch
References () https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db - () https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db - Patch
References () https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5 - () https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5 - Patch
References () https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752 - () https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752 - Patch
References () https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54 - () https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54 - Patch
References () https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df - () https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df - Patch
References () https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7 - () https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7 - Patch
References () https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b - () https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b - Patch
CWE NVD-CWE-noinfo

Information

Published : 2025-05-01 15:16

Updated : 2025-11-07 18:25


NVD link : CVE-2022-49772

Mitre link : CVE-2022-49772

CVE.ORG link : CVE-2022-49772


JSON object : View

Products Affected

linux

  • linux_kernel