CVE-2022-29022
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
20/05/2022
Last modified:
03/11/2025
Description
A buffer overflow vulnerability exists in the razeraccessory driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openrazer_project:openrazer:*:*:*:*:*:*:*:* | 3.3.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openrazer/openrazer/pull/1790
- https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
- https://github.com/openrazer/openrazer/pull/1790
- https://lists.debian.org/debian-lts-announce/2025/04/msg00032.html
- https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities



