CVE-2022-50757

Source
https://cve.org/CVERecord?id=CVE-2022-50757
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50757.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50757
Downstream
Related
Published
2025-12-24T13:05:50.399Z
Modified
2026-03-12T03:26:51.461550Z
Summary
media: camss: Clean up received buffers on failed start of streaming
Details

In the Linux kernel, the following vulnerability has been resolved:

media: camss: Clean up received buffers on failed start of streaming

It is required to return the received buffers, if streaming can not be started. For instance mediapipelinestart() may fail with EPIPE, if a link validation between entities is not passed, and in such a case a user gets a kernel warning:

WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2startstreaming+0xec/0x160 <snip> Call trace: vb2startstreaming+0xec/0x160 vb2corestreamon+0x9c/0x1a0 vb2ioctlstreamon+0x68/0xbc v4l_streamon+0x30/0x3c _videodoioctl+0x184/0x3e0 videousercopy+0x37c/0x7b0 videoioctl2+0x24/0x40 v4l2ioctl+0x4c/0x70

The fix is to correct the error path in videostartstreaming() of camss.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50757.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ac2586c410fe00d58dd09bf270a22f25d5287b8
Fixed
75954cde8a5ca84003b24b6bf83197240935bd74
Fixed
04c734c716a97f1493b1edac41316aaed1d2a9d9
Fixed
fe443b3fe36cd23d4f5dc6d825d34322e7c89f0c
Fixed
3d5cab726e3b370fea1b6e67183f0e13c409ce5c
Fixed
d1c44928bb3ca0ec88e7ad5937a2a26a259aede6
Fixed
f05326a440dc31b91b688b2f3f15b7347894a50b
Fixed
24df4fa3e795fb4b15fd4d3c036596e0978d265a
Fixed
c8f3582345e6a69da65ab588f7c4c2d1685b0e80

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50757.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
4.14.303
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50757.json"