CVE Vulnerabilities

CVE-2022-2652

Use of Externally-Controlled Format String

Published: Aug 04, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Depending on the way the format strings in the card label are crafted its possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
V4l2loopback V4l2loopback_project * 0.12.6 (excluding)
V4l2loopback Ubuntu bionic *
V4l2loopback Ubuntu focal *
V4l2loopback Ubuntu kinetic *
V4l2loopback Ubuntu lunar *
V4l2loopback Ubuntu mantic *
V4l2loopback Ubuntu oracular *
V4l2loopback Ubuntu trusty *
V4l2loopback Ubuntu xenial *

Potential Mitigations

References