{"affected":[{"ecosystem_specific":{"binaries":[{"v4l2loopback-autoload":"0.12.5-lp153.2.5.1","v4l2loopback-kmp-64kb":"0.12.5_k5.3.18_150300.59.93-lp153.2.5.1","v4l2loopback-kmp-default":"0.12.5_k5.3.18_150300.59.93-lp153.2.5.1","v4l2loopback-kmp-preempt":"0.12.5_k5.3.18_150300.59.93-lp153.2.5.1","v4l2loopback-utils":"0.12.5-lp153.2.5.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"v4l2loopback","purl":"pkg:rpm/opensuse/v4l2loopback&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.12.5-lp153.2.5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for v4l2loopback fixes the following issues:\n\n- Fix string format vulnerability (boo#1202156, CVE-2022-2652)\n","id":"openSUSE-SU-2022:10160-1","modified":"2022-10-20T16:01:45Z","published":"2022-10-20T16:01:45Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7TOUD7WBZ7HIZPTAF5TWVMSY3TRYEZ7/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2652"}],"related":["CVE-2022-2652"],"summary":"Security update for v4l2loopback","upstream":["CVE-2022-2652"]}