CVE-2022-49772

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and snd_BUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

23 Dec 2025, 14:16

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

07 Nov 2025, 18:25

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: Se omite snd_BUG_ON() de snd_usbmidi_output_open(). snd_usbmidi_output_open() tiene una comprobación del puerto nulo con snd_BUG_ON(). Se usó snd_BUG_ON() porque esto no debería haber ocurrido, pero en realidad, el puerto nulo puede detectarse cuando el dispositivo proporciona una configuración de endpoint no válida en el descriptor, por lo que el controlador omite la asignación. Es decir, la comprobación en sí es válida y snd_BUG_ON() debería omitirse. De lo contrario, es confuso, como si se tratara de un error real, como lo detectó syzbot recientemente.
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10 - () https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10 - Patch
References () https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db - () https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db - Patch
References () https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5 - () https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5 - Patch
References () https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752 - () https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752 - Patch
References () https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54 - () https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54 - Patch
References () https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df - () https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df - Patch
References () https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7 - () https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7 - Patch
References () https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b - () https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b - Patch

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-12-23 14:16


NVD link : CVE-2022-49772

Mitre link : CVE-2022-49772

CVE.ORG link : CVE-2022-49772


JSON object : View

Products Affected

linux

  • linux_kernel