CVE-2022-2652

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
@huntrdevCNA
7.3 HIGH
LOCAL
LOW
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
VendorProductVersion
v4l2loopback_projectv4l2loopback
𝑥
< 0.12.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
v4l2loopback
bullseye
unimportant
bookworm
0.12.7-2
fixed
sid
0.13.2-1
fixed
trixie
0.13.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
v4l2loopback
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored