Metrics
Affected Vendors & Products
Sat, 21 Jun 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 07 Jun 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 02 May 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 01 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() snd_usbmidi_output_open() has a check of the NULL port with snd_BUG_ON(). snd_BUG_ON() was used as this shouldn't have happened, but in reality, the NULL port may be seen when the device gives an invalid endpoint setup at the descriptor, hence the driver skips the allocation. That is, the check itself is valid and snd_BUG_ON() should be dropped from there. Otherwise it's confusing as if it were a real bug, as recently syzbot stumbled on it. | |
Title | ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-01T14:09:09.697Z
Updated: 2025-05-04T08:45:03.190Z
Reserved: 2025-04-16T07:17:33.805Z
Link: CVE-2022-49772

No data.

Status : Awaiting Analysis
Published: 2025-05-01T15:16:00.347
Modified: 2025-05-02T13:53:20.943
Link: CVE-2022-49772
