CVE-2022-2652 Vulnerability Details

  /     /     /  

CVE-2022-2652 Metadata Quick Info

CVE Published: 04/08/2022 | CVE Updated: 03/08/2024 | CVE Year: 2022
Source: @huntrdev | Vendor: umlaeute | Product: umlaeute/v4l2loopback
Status : PUBLISHED

CVE-2022-2652 Description

Depending on the way the format strings in the card label are crafted it\'s possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-134
CWE Name: CWE-134 Use of Externally-Controlled Format String
Source: umlaeute

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).