CVE-2022-2652

NameCVE-2022-2652
DescriptionDepending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs1016685

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
v4l2loopback (PTS)buster0.12.1-1vulnerable
bullseye0.12.5-1vulnerable
bookworm, sid0.12.7-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
v4l2loopbacksource(unstable)0.12.7-11016685

Notes

https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5
https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd (main)
https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff (v0.12.6)

Search for package or bug name: Reporting problems