Overview
- Description
- Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
- Source
- security@huntr.dev
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6
- Impact score
- 5.2
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 5.3
- Exploitability score
- 1.5
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
- Severity
- HIGH
Weaknesses
- security@huntr.dev
- CWE-134
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:v4l2loopback_project:v4l2loopback:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80644B02-6794-437D-8E55-1F0BD2763E67", "versionEndExcluding": "0.12.6" } ], "operator": "OR" } ] } ]