File _patchinfo of Package patchinfo.4117
<patchinfo incident="4117">
<issue id="983215" tracker="bnc">VUL-1: CVE-2012-6702: expat: XML_Parse breaks rand() function</issue>
<issue id="983216" tracker="bnc">VUL-1: CVE-2016-5300: expat: Re: expat hash collision fix too predictable?</issue>
<issue id="2012-6702" tracker="cve" />
<issue id="2016-5300" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>scarabeus_iv</packager>
<description>
This update for expat fixes the following security issues:
- CVE-2012-6702: Expat, when used in a parser that has not
called XML_SetHashSalt or passed it a seed of 0, made it easier for
context-dependent attackers to defeat cryptographic protection mechanisms
via vectors involving use of the srand function. (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
for hash initialization, which allowed context-dependent attackers to
cause a denial of service (CPU consumption) via crafted identifiers in
an XML document. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2012-0876. (bsc#983216)
</description>
<summary>Security update for expat</summary>
</patchinfo>