Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2652

Опубликовано: 04 авг. 2022
Источник: debian

Описание

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
v4l2loopbackfixed0.12.7-1package

Примечания

  • https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5

  • https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd (main)

  • https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff (v0.12.6)

  • Negligible security impact

Связанные уязвимости

CVSS3: 6
ubuntu
больше 3 лет назад

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

CVSS3: 6
nvd
больше 3 лет назад

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

suse-cvrf
больше 3 лет назад

Security update for v4l2loopback

suse-cvrf
больше 3 лет назад

Security update for v4l2loopback

CVSS3: 6
github
больше 3 лет назад

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).