Name | CVE-2022-2652 |
Description | Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1016685 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
v4l2loopback (PTS) | jessie | 0.8.0-4 | vulnerable |
| stretch | 0.10.0-1 | vulnerable |
| buster | 0.12.1-1 | vulnerable |
| bullseye | 0.12.5-1 | vulnerable |
| bookworm | 0.12.7-2 | fixed |
| sid, trixie | 0.13.2-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5
https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd (main)
https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff (v0.12.6)
Negligible security impact