Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
References
Link | Resource |
---|---|
https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd | Patch Third Party Advisory |
Configurations
Information
Published : 2022-08-04 03:15
Updated : 2022-08-10 06:40
NVD link : CVE-2022-2652
Mitre link : CVE-2022-2652
JSON object : View
CWE
CWE-134
Use of Externally-Controlled Format String
Products Affected
v4l2loopback_project
- v4l2loopback