File _patchinfo of Package patchinfo.23016
<patchinfo incident="23016">
<issue tracker="cve" id="2022-25314"/>
<issue tracker="cve" id="2022-25236"/>
<issue tracker="cve" id="2022-25315"/>
<issue tracker="cve" id="2022-25235"/>
<issue tracker="cve" id="2022-25313"/>
<issue tracker="bnc" id="1196168">VUL-0: CVE-2022-25313: expat: Stack exhaustion in build_model() via uncontrolled recursion</issue>
<issue tracker="bnc" id="1196171">VUL-0: CVE-2022-25315: expat: Integer overflow in storeRawNames</issue>
<issue tracker="bnc" id="1196026">VUL-0: CVE-2022-25235: expat: xmltok_impl.c in Expat before 2.4.5 does not check whether a UTF-8 character is valid in a certain context.</issue>
<issue tracker="bnc" id="1196169">VUL-0: CVE-2022-25314: expat: Integer overflow in copyString</issue>
<issue tracker="bnc" id="1196025">VUL-0: CVE-2022-25236: expat: xmlparse.c in Expat before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.</issue>
<packager>david.anes</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for expat</summary>
<description>This update for expat fixes the following issues:
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
</description>
</patchinfo>