Security update for expat

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
called XML_SetHashSalt or passed it a seed of 0, made it easier for
context-dependent attackers to defeat cryptographic protection mechanisms
via vectors involving use of the srand function. (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
for hash initialization, which allowed context-dependent attackers to
cause a denial of service (CPU consumption) via crafted identifiers in
an XML document. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2012-0876. (bsc#983216)

This update was imported from the SUSE:SLE-12:Update update project.

Fixed bugs
bnc#983215
VUL-1: CVE-2012-6702: expat: XML_Parse breaks rand() function
bnc#983216
VUL-1: CVE-2016-5300: expat: Re: expat hash collision fix too predictable?
Selected Binaries
openSUSE Build Service is sponsored by