Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-2652
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Use of Externally-Controlled Format String in umlaeute/v4l2loopback
Source: NVD (National Vulnerability Database)
Vulnerability Description
Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用外部控制的格式字符串
Source: NVD (National Vulnerability Database)
Vulnerability Title
v4l2loopback 格式化字符串错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
v4l2loopback是umläute个人开发者的一个创建 V4L2 环回设备的内核模块。 v4l2loopback存在格式化字符串错误漏洞,该漏洞源于根据卡标签中的格式化字符串的方式,有可能泄露内核栈内存,还有可能由于内核模块在按要求提供卡片标签时崩溃而造成DoS(例如,在一排有许多%s修饰的情况下出现)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
umlaeuteumlaeute/v4l2loopback unspecified ~ 0.12.6 -
II. Public POCs for CVE-2022-2652
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-2652
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-2652

No comments yet


Leave a comment