CVE Vulnerabilities

CVE-2022-2652

Use of Externally-Controlled Format String

Published: Aug 04, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Depending on the way the format strings in the card label are crafted its possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
V4l2loopbackV4l2loopback_project*0.12.6 (excluding)
V4l2loopbackUbuntubionic*
V4l2loopbackUbuntufocal*
V4l2loopbackUbuntukinetic*
V4l2loopbackUbuntulunar*
V4l2loopbackUbuntumantic*
V4l2loopbackUbuntuoracular*
V4l2loopbackUbuntuplucky*
V4l2loopbackUbuntutrusty*
V4l2loopbackUbuntuxenial*

Potential Mitigations

References