Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
{
"cna_assigner": "@huntrdev",
"cwe_ids": [
"CWE-134"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2652.json"
}[
{
"digest": {
"length": 241.0,
"function_hash": "17655112517341927947855752917222436908"
},
"source": "https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff",
"deprecated": false,
"id": "CVE-2022-2652-547173f8",
"signature_type": "Function",
"target": {
"function": "vidioc_fill_name",
"file": "v4l2loopback.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"607323426929696240384345123304587602",
"126162870000493936069617165373821292745",
"85643229720984706472731090811458114495",
"107448680855750404162403722163778660045"
]
},
"source": "https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff",
"deprecated": false,
"id": "CVE-2022-2652-88b5ae4c",
"signature_type": "Line",
"target": {
"file": "v4l2loopback.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2652.json"
[
{
"digest": {
"length": 1349.0,
"function_hash": "274784180735557093665846749706206048667"
},
"source": "https://github.com/v4l2loopback/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd",
"deprecated": false,
"id": "CVE-2022-2652-2c787083",
"signature_type": "Function",
"target": {
"function": "vidioc_querycap",
"file": "v4l2loopback.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"262514196616214796308095471843831246256",
"302506495182271439896700798722027783645",
"265352794914620443317624149207610803571",
"270556655472954525905887242051867458333",
"310308737864205908898128503558395795380",
"84511011984775287962644553050385331413",
"244106889796439449548158295482160506678",
"224098727542074230562953580409407783554"
]
},
"source": "https://github.com/v4l2loopback/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd",
"deprecated": false,
"id": "CVE-2022-2652-5039efdf",
"signature_type": "Line",
"target": {
"file": "v4l2loopback.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 5665.0,
"function_hash": "124694354941320819147030808424706657329"
},
"source": "https://github.com/v4l2loopback/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd",
"deprecated": false,
"id": "CVE-2022-2652-ddb7d7a8",
"signature_type": "Function",
"target": {
"function": "v4l2_loopback_add",
"file": "v4l2loopback.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2652.json"