Executive Summary

Informations
Name CVE-2022-49772 First vendor Publication 2025-05-01
Vendor Cve Last vendor Modification 2025-05-02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()

snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and snd_BUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49772

Sources (Detail)

https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10
https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db
https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5
https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752
https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54
https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df
https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7
https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:12:01
  • First insertion