DEBIAN-CVE-2022-50359

Source
https://security-tracker.debian.org/tracker/CVE-2022-50359
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50359.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50359
Upstream
Published
2025-09-17T15:15:34Z
Modified
2025-09-19T07:33:08.252591Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: media: cx88: Fix a null-ptr-deref bug in bufferprepare() When the driver calls cx88riscbuffer() to prepare the buffer, the function call may fail, resulting in a empty buffer and null-ptr-deref later in bufferqueue(). The following log can reveal it: [ 41.822762] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI [ 41.824488] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 41.828027] RIP: 0010:bufferqueue+0xc2/0x500 [ 41.836311] Call Trace: [ 41.836945] _enqueueindriver+0x141/0x360 [ 41.837262] vb2startstreaming+0x62/0x4a0 [ 41.838216] vb2corestreamon+0x1da/0x2c0 [ 41.838516] _vb2initfileio+0x981/0xbc0 [ 41.839141] _vb2performfileio+0xbf9/0x1120 [ 41.840072] vb2fopread+0x20e/0x400 [ 41.840346] v4l2read+0x215/0x290 [ 41.840603] vfsread+0x162/0x4c0 Fix this by checking the return value of cx88riscbuffer() [hverkuil: fix coding style issues]

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.158-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}