openSUSE: 2022:10160-1 moderate: v4l2loopback
Description
This update for v4l2loopback fixes the following issues: - Fix string format vulnerability (boo#1202156, CVE-2022-2652)
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-2022-10160=1
Package List
- openSUSE Leap 15.3 (aarch64 x86_64): v4l2loopback-debugsource-0.12.5-lp153.2.5.1 v4l2loopback-kmp-default-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 v4l2loopback-kmp-default-debuginfo-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 v4l2loopback-kmp-preempt-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 v4l2loopback-kmp-preempt-debuginfo-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 - openSUSE Leap 15.3 (aarch64): v4l2loopback-kmp-64kb-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 v4l2loopback-kmp-64kb-debuginfo-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 - openSUSE Leap 15.3 (noarch): v4l2loopback-autoload-0.12.5-lp153.2.5.1 v4l2loopback-utils-0.12.5-lp153.2.5.1
References
https://www.suse.com/security/cve/CVE-2022-2652.html https://bugzilla.suse.com/1202156