From a14b0fb0da2f66a9527c7d2ce36a2b969a9ddf55 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adrian=20Schr=C3=B6ter?= Date: Wed, 11 Sep 2024 13:31:01 +0200 Subject: [PATCH] Adding patchinfo patchinfo.20240906075939659340.90520734224245 --- .../_patchinfo | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 patchinfo.20240906075939659340.90520734224245/_patchinfo diff --git a/patchinfo.20240906075939659340.90520734224245/_patchinfo b/patchinfo.20240906075939659340.90520734224245/_patchinfo new file mode 100644 index 0000000..72669f8 --- /dev/null +++ b/patchinfo.20240906075939659340.90520734224245/_patchinfo @@ -0,0 +1,24 @@ + + + VUL-0: CVE-2024-28757: expat: libexpat: XML Entity Expansion + VUL-0: CVE-2024-45490: expat: reject negative len for XML_ParseBuffer + VUL-0: CVE-2024-45491: expat: detect integer overflow in dtdCopy + VUL-0: CVE-2024-45492: expat: detect integer overflow in function nextScaffoldPart + + + + + david.anes + important + security + Security update for expat + This update for expat fixes the following issues: + +- CVE-2024-45492: detect integer overflow in function nextScaffoldPart (bsc#1229932) +- CVE-2024-45491: detect integer overflow in dtdCopy (bsc#1229931) +- CVE-2024-45490: reject negative len for XML_ParseBuffer (bsc#1229930) +- CVE-2024-28757: XML Entity Expansion attack when there is isolated use of external parsers (bsc#1221289) + + expat + +