CVE-2022-49772

Source
https://cve.org/CVERecord?id=CVE-2022-49772
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49772.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49772
Downstream
Related
Published
2025-05-01T14:09:09.697Z
Modified
2026-03-20T11:47:14.231218Z
Summary
ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Drop sndBUGON() from sndusbmidioutput_open()

sndusbmidioutputopen() has a check of the NULL port with sndBUGON(). sndBUGON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and sndBUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49772.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
738d9edcfd44f154924692e54109fb439fcf8bdd
Fixed
c43991065f36f7628cd124e037b8750c4617a7a7
Fixed
e7dc436aea80308a9268e6d2d85f910ff107de9b
Fixed
a80369c8ca50bc885d14386087a834659ec54a54
Fixed
02b94885b2fdf1808b1874e009bfb90753f8f4db
Fixed
00f5f1bbf815a39e9eecb468d12ca55d3360eb10
Fixed
ad72c3c3f6eb81d2cb189ec71e888316adada5df

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49772.json"