<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for v4l2loopback</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:10159-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-10-20T16:01:41Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-10-20T16:01:41Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-10-20T16:01:41Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for v4l2loopback</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for v4l2loopback fixes the following issues:

- Fix string format vulnerability (boo#1202156, CVE-2022-2652)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2022-10159</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F2WY45Y5MOK5BLB5QRH5F6TM4CWLBTL5/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:10159-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202156</URL>
      <Description>SUSE Bug 1202156</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2652/</URL>
      <Description>SUSE CVE CVE-2022-2652 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="v4l2loopback-autoload-0.12.5-lp154.3.3.1">
      <FullProductName ProductID="v4l2loopback-autoload-0.12.5-lp154.3.3.1">v4l2loopback-autoload-0.12.5-lp154.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">
      <FullProductName ProductID="v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">
      <FullProductName ProductID="v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="v4l2loopback-utils-0.12.5-lp154.3.3.1">
      <FullProductName ProductID="v4l2loopback-utils-0.12.5-lp154.3.3.1">v4l2loopback-utils-0.12.5-lp154.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="v4l2loopback-autoload-0.12.5-lp154.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:v4l2loopback-autoload-0.12.5-lp154.3.3.1">v4l2loopback-autoload-0.12.5-lp154.3.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1">v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="v4l2loopback-utils-0.12.5-lp154.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:v4l2loopback-utils-0.12.5-lp154.3.3.1">v4l2loopback-utils-0.12.5-lp154.3.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).</Note>
    </Notes>
    <CVE>CVE-2022-2652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.4:v4l2loopback-autoload-0.12.5-lp154.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:v4l2loopback-kmp-64kb-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:v4l2loopback-kmp-default-0.12.5_k5.14.21_150400.24.21-lp154.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:v4l2loopback-utils-0.12.5-lp154.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F2WY45Y5MOK5BLB5QRH5F6TM4CWLBTL5/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2652.html</URL>
        <Description>CVE-2022-2652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202156</URL>
        <Description>SUSE Bug 1202156</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
