CVE-2022-50757Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: media: camss: Clean up received buffers on failed start of streaming It is required to return the received buffers, if streaming can not be started. For instance media_pipeline_start() may fail with EPIPE, if a link validation between entities is not passed, and in such a case a user gets a kernel warning: WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2_start_streaming+0xec/0x160 Call tra

Affected Packages4 packages

Linuxlinux/linux_kernel4.14.04.14.303+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux0ac2586c410fe00d58dd09bf270a22f25d5287b875954cde8a5ca84003b24b6bf83197240935bd74+8
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
media: camss: Clean up received buffers on failed start of streaming2025-12-24
GHSA
GHSA-g5hv-6pvx-45rj: In the Linux kernel, the following vulnerability has been resolved: media: camss: Clean up received buffers on failed start of streaming It is requi2025-12-24
OSV
CVE-2022-50757: In the Linux kernel, the following vulnerability has been resolved: media: camss: Clean up received buffers on failed start of streaming It is require2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: media: camss: Clean up received buffers on failed start of streaming2025-12-24
Debian
CVE-2022-50757: linux - In the Linux kernel, the following vulnerability has been resolved: media: cams...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50757 Impact, Exploitability, and Mitigation Steps | Wiz