{"affected":[{"ecosystem_specific":{"binaries":[{"libmpv1":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1","mpv":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1","mpv-bash-completion":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1","mpv-devel":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1","mpv-zsh-completion":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"mpv","purl":"pkg:rpm/opensuse/mpv&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for mpv fixes the following issues:\n\n- CVE-2021-30145: Fixed format string vulnerability allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file (boo#1186230)\n","id":"openSUSE-SU-2021:0788-1","modified":"2021-05-24T12:03:34Z","published":"2021-05-24T12:03:34Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVXB4F67QODLPKYBZX7SBXTE7ESGKGOD/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-30145"}],"related":["CVE-2021-30145"],"summary":"Security update for mpv","upstream":["CVE-2021-30145"]}