{"affected":[{"ecosystem_specific":{"binaries":[{"libexpat-devel":"2.0.1-88.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"expat","purl":"pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.1-88.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"expat":"2.0.1-88.41.1","libexpat1":"2.0.1-88.41.1","libexpat1-32bit":"2.0.1-88.41.1","libexpat1-x86":"2.0.1-88.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"expat","purl":"pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.1-88.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"expat":"2.0.1-88.41.1","libexpat1":"2.0.1-88.41.1","libexpat1-32bit":"2.0.1-88.41.1","libexpat1-x86":"2.0.1-88.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"expat","purl":"pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.1-88.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexpat-devel":"2.0.1-88.41.1"}]},"package":{"ecosystem":"SUSE:Studio Onsite 1.3","name":"expat","purl":"pkg:rpm/suse/expat&distro=SUSE%20Studio%20Onsite%201.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.1-88.41.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for expat fixes the following security issues:\n\n- CVE-2012-6702: Expat, when used in a parser that has not\n  called XML_SetHashSalt or passed it a seed of 0, made it easier for\n  context-dependent attackers to defeat cryptographic protection mechanisms\n  via vectors involving use of the srand function.  (bsc#983215)\n- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy\n  for hash initialization, which allowed context-dependent attackers to\n  cause a denial of service (CPU consumption) via crafted identifiers in\n  an XML document. NOTE: this vulnerability exists because of an incomplete\n  fix for CVE-2012-0876.  (bsc#983216)\n","id":"SUSE-SU-2017:0415-1","modified":"2017-02-07T12:17:55Z","published":"2017-02-07T12:17:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170415-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022037"},{"type":"REPORT","url":"https://bugzilla.suse.com/983215"},{"type":"REPORT","url":"https://bugzilla.suse.com/983216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-6702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5300"}],"related":["CVE-2012-6702","CVE-2016-5300"],"summary":"Security update for expat","upstream":["CVE-2012-6702","CVE-2016-5300"]}