CVE-2022-50757
Unknown Unknown - Not Provided
Buffer Management Error in Linux camss Media Streaming Causes Kernel Warning

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: media: camss: Clean up received buffers on failed start of streaming It is required to return the received buffers, if streaming can not be started. For instance media_pipeline_start() may fail with EPIPE, if a link validation between entities is not passed, and in such a case a user gets a kernel warning: WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2_start_streaming+0xec/0x160 <snip> Call trace: vb2_start_streaming+0xec/0x160 vb2_core_streamon+0x9c/0x1a0 vb2_ioctl_streamon+0x68/0xbc v4l_streamon+0x30/0x3c __video_do_ioctl+0x184/0x3e0 video_usercopy+0x37c/0x7b0 video_ioctl2+0x24/0x40 v4l2_ioctl+0x4c/0x70 The fix is to correct the error path in video_start_streaming() of camss.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux linux_kernel *
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's media subsystem, specifically in the camss driver. When starting video streaming, if the streaming cannot be started due to a failure such as a link validation error, the system fails to properly clean up and return the received buffers. This can lead to a kernel warning and improper handling of resources. The fix involves correcting the error handling path to ensure that received buffers are returned if streaming fails to start.


How can this vulnerability impact me? :

If this vulnerability is triggered, it can cause kernel warnings and potentially lead to resource leaks or instability in the media streaming functionality of the Linux kernel. This may affect applications relying on video streaming, causing them to malfunction or crash due to improper buffer management.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring the kernel logs for warnings related to video buffer streaming failures. Specifically, look for kernel warnings containing 'vb2_start_streaming' and messages indicating failure to start streaming, such as those involving 'media_pipeline_start()' failing with EPIPE. You can use the command 'dmesg | grep vb2_start_streaming' or 'journalctl -k | grep vb2_start_streaming' to find such warnings.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the Linux kernel to a version where the fix is applied, which corrects the error path in video_start_streaming() of the camss driver to properly clean up received buffers on failed streaming starts. Until then, monitoring for the kernel warnings and avoiding usage scenarios that trigger streaming start failures may reduce impact.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart