-

CVE-2022-50757

In the Linux kernel, the following vulnerability has been resolved:

media: camss: Clean up received buffers on failed start of streaming

It is required to return the received buffers, if streaming can not be
started. For instance media_pipeline_start() may fail with EPIPE, if
a link validation between entities is not passed, and in such a case
a user gets a kernel warning:

  WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2_start_streaming+0xec/0x160
  <snip>
  Call trace:
   vb2_start_streaming+0xec/0x160
   vb2_core_streamon+0x9c/0x1a0
   vb2_ioctl_streamon+0x68/0xbc
   v4l_streamon+0x30/0x3c
   __video_do_ioctl+0x184/0x3e0
   video_usercopy+0x37c/0x7b0
   video_ioctl2+0x24/0x40
   v4l2_ioctl+0x4c/0x70

The fix is to correct the error path in video_start_streaming() of camss.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 75954cde8a5ca84003b24b6bf83197240935bd74
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < 04c734c716a97f1493b1edac41316aaed1d2a9d9
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < fe443b3fe36cd23d4f5dc6d825d34322e7c89f0c
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < 3d5cab726e3b370fea1b6e67183f0e13c409ce5c
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < d1c44928bb3ca0ec88e7ad5937a2a26a259aede6
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < f05326a440dc31b91b688b2f3f15b7347894a50b
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < 24df4fa3e795fb4b15fd4d3c036596e0978d265a
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
Version < c8f3582345e6a69da65ab588f7c4c2d1685b0e80
Version 0ac2586c410fe00d58dd09bf270a22f25d5287b8
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.14
Status affected
Version < 4.14
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.