A vulnerability was detected in libuvc up to 0.0.7. Affected is the function uvc_scan_streaming of the file src/device.c of the component UVC Descriptor Handler. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/libuvc/libuvc/ | Product |
| https://github.com/libuvc/libuvc/issues/300 | Exploit Vendor Advisory |
| https://github.com/oneafter/0104/blob/main/repro | Product |
| https://vuldb.com/?ctiid.344509 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344509 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.743388 | Exploit Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 20:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/libuvc/libuvc/ - Product | |
| References | () https://github.com/libuvc/libuvc/issues/300 - Exploit, Vendor Advisory | |
| References | () https://github.com/oneafter/0104/blob/main/repro - Product | |
| References | () https://vuldb.com/?ctiid.344509 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.344509 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.743388 - Exploit, Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:libuvc:libuvc:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Libuvc libuvc
Libuvc |
06 Feb 2026, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 06:15
Updated : 2026-03-05 20:58
NVD link : CVE-2026-1991
Mitre link : CVE-2026-1991
CVE.ORG link : CVE-2026-1991
JSON object : View
Products Affected
libuvc
- libuvc
