Possible kernel stack memory leak and DoS due to crafted format strings in card label, v4l2loopback kernel module crash from many %s modifiers
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | CVE-2022-2652 | 4 Aug 202210:15 | – | nvd |
![]() | CVE-2022-2652 | 4 Aug 202210:15 | – | osv |
![]() | Format string | 4 Aug 202210:15 | – | prion |
![]() | Security update for v4l2loopback (moderate) | 20 Oct 202200:00 | – | suse |
![]() | Security update for v4l2loopback (moderate) | 20 Oct 202200:00 | – | suse |
![]() | CVE-2022-2652 Use of Externally-Controlled Format String in umlaeute/v4l2loopback | 4 Aug 202209:35 | – | cvelist |
![]() | openSUSE 15 Security Update : v4l2loopback (openSUSE-SU-2022:10159-1) | 21 Oct 202200:00 | – | nessus |
![]() | openSUSE 15 Security Update : v4l2loopback (openSUSE-SU-2022:10160-1) | 21 Oct 202200:00 | – | nessus |
![]() | Format string modifiers in card label | 28 Jul 202218:44 | – | huntr |
![]() | CVE-2022-2652 | 4 Aug 202210:15 | – | debiancve |
[
{
"product": "umlaeute/v4l2loopback",
"vendor": "umlaeute",
"versions": [
{
"lessThan": "0.12.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo