Bug 2363422 (CVE-2022-49772) - CVE-2022-49772 kernel: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
Summary: CVE-2022-49772 kernel: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_ou...
Keywords:
Status: NEW
Alias: CVE-2022-49772
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 15:04 UTC by OSIDB Bzimport
Modified: 2025-06-21 00:34 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-01 15:04:01 UTC
In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()

snd_usbmidi_output_open() has a check of the NULL port with
snd_BUG_ON().  snd_BUG_ON() was used as this shouldn't have happened,
but in reality, the NULL port may be seen when the device gives an
invalid endpoint setup at the descriptor, hence the driver skips the
allocation.  That is, the check itself is valid and snd_BUG_ON()
should be dropped from there.  Otherwise it's confusing as if it were
a real bug, as recently syzbot stumbled on it.

Comment 1 Avinash Hanwate 2025-05-02 04:18:30 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2022-49772-912e@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.