CVE-2022-2652

medium

Description

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

References

https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5

https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd

Details

Source: Mitre, NVD

Published: 2022-08-04

Updated: 2022-08-10

Risk Information

CVSS v2

Base Score: 5.9

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 6

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

Severity: Medium