{"id":"CVE-2022-50719","summary":"ALSA: line6: fix stack overflow in line6_midi_transmit","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: line6: fix stack overflow in line6_midi_transmit\n\nCorrectly calculate available space including the size of the chunk\nbuffer. This fixes a buffer overflow when multiple MIDI sysex\nmessages are sent to a PODxt device.","modified":"2026-04-02T08:28:43.374278Z","published":"2025-12-24T12:22:42.697Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50719.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c76087449ee4ed45a88b10017d02c6694caedb1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0c9118e381ff538874e00fd4e66a768273c150fb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25e8c6ecb46843a955f254b8f0d77894e4a53dc4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/389d34c2a8b52acc351fd932ed4bea41fee5a39b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49cb7737e733013ec86aa77ed2e19b94a68eaa05"},{"type":"WEB","url":"https://git.kernel.org/stable/c/61e4be4a60cc6de723f8c574ddbcb3025eb44cac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66f359ad66d49f75d39ac729f9114dabf90b81bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b026af92b2cea907c780f7168c730c816cd33311"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8800d324abb50160560c636bfafe2c81001b66c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50719.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50719"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f2459201c72e8f8553644505eed19954d4c3a023"},{"fixed":"b026af92b2cea907c780f7168c730c816cd33311"},{"fixed":"49cb7737e733013ec86aa77ed2e19b94a68eaa05"},{"fixed":"0c76087449ee4ed45a88b10017d02c6694caedb1"},{"fixed":"25e8c6ecb46843a955f254b8f0d77894e4a53dc4"},{"fixed":"66f359ad66d49f75d39ac729f9114dabf90b81bb"},{"fixed":"0c9118e381ff538874e00fd4e66a768273c150fb"},{"fixed":"61e4be4a60cc6de723f8c574ddbcb3025eb44cac"},{"fixed":"389d34c2a8b52acc351fd932ed4bea41fee5a39b"},{"fixed":"b8800d324abb50160560c636bfafe2c81001b66c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50719.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.15.0"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.87"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50719.json"}}],"schema_version":"1.7.5"}