{"affected":[{"ecosystem_specific":{"binaries":[{"gmp-devel":"6.1.2-4.9.1","gmp-devel-32bit":"6.1.2-4.9.1","libgmp10":"6.1.2-4.9.1","libgmp10-32bit":"6.1.2-4.9.1","libgmpxx4":"6.1.2-4.9.1","libgmpxx4-32bit":"6.1.2-4.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"gmp","purl":"pkg:rpm/opensuse/gmp&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.1.2-4.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for gmp fixes the following issues:\n    \n- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).\n","id":"openSUSE-SU-2021:3946-1","modified":"2021-12-06T13:58:01Z","published":"2021-12-06T13:58:01Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R45QGO5IGOQU6FDWBSNSZHXXXTFJHN5O/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-43618"}],"related":["CVE-2021-43618"],"summary":"Security update for gmp","upstream":["CVE-2021-43618"]}