#VU120523 Input validation error in Linux kernel - CVE-2022-50757
Published: December 26, 2025 / Updated: December 31, 2025
Vulnerability identifier: #VU120523
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-50757
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the video_start_streaming() function in drivers/media/platform/qcom/camss/camss-video.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/04c734c716a97f1493b1edac41316aaed1d2a9d9
- https://git.kernel.org/stable/c/24df4fa3e795fb4b15fd4d3c036596e0978d265a
- https://git.kernel.org/stable/c/3d5cab726e3b370fea1b6e67183f0e13c409ce5c
- https://git.kernel.org/stable/c/75954cde8a5ca84003b24b6bf83197240935bd74
- https://git.kernel.org/stable/c/c8f3582345e6a69da65ab588f7c4c2d1685b0e80
- https://git.kernel.org/stable/c/d1c44928bb3ca0ec88e7ad5937a2a26a259aede6
- https://git.kernel.org/stable/c/f05326a440dc31b91b688b2f3f15b7347894a50b
- https://git.kernel.org/stable/c/fe443b3fe36cd23d4f5dc6d825d34322e7c89f0c
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.229