In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
snd_usbmidi_output_open() has a check of the NULL port with
snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened,
but in reality, the NULL port may be seen when the device gives an
invalid endpoint setup at the descriptor, hence the driver skips the
allocation. That is, the check itself is valid and snd_BUG_ON()
should be dropped from there. Otherwise it's confusing as if it were
a real bug, as recently syzbot stumbled on it.
References
Configurations
Configuration 1 (hide)
|
History
07 Nov 2025, 18:25
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10 - Patch | |
| References | () https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db - Patch | |
| References | () https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5 - Patch | |
| References | () https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752 - Patch | |
| References | () https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54 - Patch | |
| References | () https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df - Patch | |
| References | () https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7 - Patch | |
| References | () https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b - Patch | |
| CWE | NVD-CWE-noinfo |
Information
Published : 2025-05-01 15:16
Updated : 2025-11-07 18:25
NVD link : CVE-2022-49772
Mitre link : CVE-2022-49772
CVE.ORG link : CVE-2022-49772
JSON object : View
Products Affected
linux
- linux_kernel
CWE
