SB20250502291 - Buffer overflow in Linux kernel usb
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2022-49772)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the snd_usbmidi_output_open() function in sound/usb/midi.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/00f5f1bbf815a39e9eecb468d12ca55d3360eb10
- https://git.kernel.org/stable/c/02b94885b2fdf1808b1874e009bfb90753f8f4db
- https://git.kernel.org/stable/c/368a01e5064c13946d032ab1d65ba95020a39cc5
- https://git.kernel.org/stable/c/872c9314769e89d8bda74ff3ac584756a45ee752
- https://git.kernel.org/stable/c/a80369c8ca50bc885d14386087a834659ec54a54
- https://git.kernel.org/stable/c/ad72c3c3f6eb81d2cb189ec71e888316adada5df
- https://git.kernel.org/stable/c/c43991065f36f7628cd124e037b8750c4617a7a7
- https://git.kernel.org/stable/c/e7dc436aea80308a9268e6d2d85f910ff107de9b
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.225