We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49772

ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()



Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and snd_BUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it.

Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 872c9314769e89d8bda74ff3ac584756a45ee752
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 368a01e5064c13946d032ab1d65ba95020a39cc5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c43991065f36f7628cd124e037b8750c4617a7a7
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e7dc436aea80308a9268e6d2d85f910ff107de9b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a80369c8ca50bc885d14386087a834659ec54a54
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 02b94885b2fdf1808b1874e009bfb90753f8f4db
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 00f5f1bbf815a39e9eecb468d12ca55d3360eb10
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ad72c3c3f6eb81d2cb189ec71e888316adada5df
affected

Default status
affected

4.9.334
unaffected

4.14.300
unaffected

4.19.267
unaffected

5.4.225
unaffected

5.10.156
unaffected

5.15.80
unaffected

6.0.10
unaffected

6.1
unaffected

References

git.kernel.org/...c/872c9314769e89d8bda74ff3ac584756a45ee752

git.kernel.org/...c/368a01e5064c13946d032ab1d65ba95020a39cc5

git.kernel.org/...c/c43991065f36f7628cd124e037b8750c4617a7a7

git.kernel.org/...c/e7dc436aea80308a9268e6d2d85f910ff107de9b

git.kernel.org/...c/a80369c8ca50bc885d14386087a834659ec54a54

git.kernel.org/...c/02b94885b2fdf1808b1874e009bfb90753f8f4db

git.kernel.org/...c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10

git.kernel.org/...c/ad72c3c3f6eb81d2cb189ec71e888316adada5df

cve.org (CVE-2022-49772)

nvd.nist.gov (CVE-2022-49772)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49772

Support options

Helpdesk Chat, Email, Knowledgebase