<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for expat</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20207-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-29T11:07:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-29T11:07:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-29T11:07:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for expat</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for expat fixes the following issues:

Version update to 2.7.1:

* Bug fixes:

  * Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0);
    affected API functions are:

    - XML_GetCurrentByteCount
    - XML_GetCurrentByteIndex
    - XML_GetCurrentColumnNumber
    - XML_GetCurrentLineNumber
    - XML_GetInputContext

  * Other changes:
       #976 #977  Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}"
                    with Automake that were missing from 2.7.0 release tarballs
       #983 #984  Fix printf format specifiers for 32bit Emscripten
            #992  docs: Promote OpenSSF Best Practices self-certification
            #978  tests/benchmark: Resolve mistaken double close
            #986  Address compiler warnings
       #990 #993  Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
                    to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
                    for what these numbers do

        Infrastructure:
            #982  CI: Start running Perl XML::Parser integration tests
            #987  CI: Enforce Clang Static Analyzer clean code
            #991  CI: Re-enable warning clang-analyzer-valist.Uninitialized
                    for clang-tidy
            #981  CI: Cover compilation with musl
       #983 #984  CI: Cover compilation with 32bit Emscripten
       #976 #977  CI: Protect against fuzzer files missing from future
                    release archives

Version update to 2.7.0 (CVE-2024-8176 [bsc#1239618])

* Security fixes:
  * CVE-2024-8176 -- Fix crash from chaining a large number
    of entities caused by stack overflow by resolving use of
    recursion, for all three uses of entities:
    - general entities in character data ("&lt;e&gt;&amp;g1;&lt;/e&gt;")
    - general entities in attribute values ("&lt;e k1='&amp;g1;'/&gt;")
    - parameter entities ("%p1;")

   Known impact is (reliable and easy) denial of service:

   CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C

   (Base Score: 7.5, Temporal Score: 7.2)

   Please note that a layer of compression around XML can
   significantly reduce the minimum attack payload size.

   * Other changes:
     * Document changes since the previous release
     * Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
       to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
       for what these numbers do

Version update to 2.6.4:

  * Security fixes: [bsc#1232601][bsc#1232579]
    * CVE-2024-50602 -- Fix crash within function XML_ResumeParser
      from a NULL pointer dereference by disallowing function
      XML_StopParser to (stop or) suspend an unstarted parser.
      A new error code XML_ERROR_NOT_STARTED was introduced to
      properly communicate this situation.  // CWE-476 CWE-754
  * Other changes:
    * Version info bumped from 10:3:9 (libexpat*.so.1.9.3)
      to 11:0:10 (libexpat*.so.1.10.0); see https://verbump.de/
      for what these numbers do

Update to 2.6.3:

  * Security fixes:
    - CVE-2024-45490, bsc#1229930 -- Calling function XML_ParseBuffer with
      len &lt; 0 without noticing and then calling XML_GetBuffer
      will have XML_ParseBuffer fail to recognize the problem
      and XML_GetBuffer corrupt memory.
      With the fix, XML_ParseBuffer now complains with error
      XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse
      has been doing since Expat 2.2.1, and now documented.
      Impact is denial of service to potentially artitrary code
      execution.
    - CVE-2024-45491, bsc#1229931 -- Internal function dtdCopy can have an
      integer overflow for nDefaultAtts on 32-bit platforms
      (where UINT_MAX equals SIZE_MAX).
      Impact is denial of service to potentially artitrary code
      execution.
    - CVE-2024-45492, bsc#1229932 -- Internal function nextScaffoldPart can
      have an integer overflow for m_groupSize on 32-bit
      platforms (where UINT_MAX equals SIZE_MAX).
      Impact is denial of service to potentially artitrary code
      execution.

  * Other changes:

    - Version info bumped from 10:2:9 (libexpat*.so.1.9.2)
      to 10:3:9 (libexpat*.so.1.9.3); see https://verbump.de/
      for what these numbers do  

Update to 2.6.2:

  * CVE-2024-28757 -- Prevent billion laughs attacks with isolated
    use of external parsers (bsc#1221289)
  * Reject direct parameter entity recursion and avoid the related
    undefined behavior

Update to 2.6.1:

  * Expose billion laughs API with XML_DTD defined and XML_GE
    undefined, regression from 2.6.0
  * Make tests independent of CPU speed, and thus more robust

Update to 2.6.0: 

  * Security fixes:
    - CVE-2023-52425 (bsc#1219559)  
      Fix quadratic runtime issues with big tokens
      that can cause denial of service, in partial where
      dealing with compressed XML input.  Applications
      that parsed a document in one go -- a single call to
      functions XML_Parse or XML_ParseBuffer -- were not affected.
      The smaller the chunks/buffers you use for parsing
      previously, the bigger the problem prior to the fix.
      Backporters should be careful to no omit parts of
      pull request #789 and to include earlier pull request #771,
      in order to not break the fix.
    - CVE-2023-52426 (bsc#1219561)
      Fix billion laughs attacks for users
      compiling *without* XML_DTD defined (which is not common).
      Users with XML_DTD defined have been protected since
      Expat &gt;=2.4.0 (and that was CVE-2013-0340 back then).
  * Bug fixes:
    - Fix parse-size-dependent "invalid token" error for
      external entities that start with a byte order mark
    - Fix NULL pointer dereference in setContext via
      XML_ExternalEntityParserCreate for compilation with
      XML_DTD undefined
    - Protect against closing entities out of order
  * Other changes:
    - Improve support for arc4random/arc4random_buf
    - Improve buffer growth in XML_GetBuffer and XML_Parse
    - xmlwf: Support --help and --version
    - xmlwf: Support custom buffer size for XML_GetBuffer and read
    - xmlwf: Improve language and URL clickability in help output
    - examples: Add new example "element_declarations.c"
    - Be stricter about macro XML_CONTEXT_BYTES at build time
    - Make inclusion to expat_config.h consistent
    - Autotools: configure.ac: Support --disable-maintainer-mode
    - Autotools: Sync CMake templates with CMake 3.26
    - Autotools: Make installation of shipped man page doc/xmlwf.1
      independent of docbook2man availability
    - Autotools|CMake: Add missing -DXML_STATIC to pkg-config file
      section "Cflags.private" in order to fix compilation
      against static libexpat using pkg-config on Windows
    - Autotools|CMake: Require a C99 compiler
      (a de-facto requirement already since Expat 2.2.2 of 2017)
    - Autotools|CMake: Fix PACKAGE_BUGREPORT variable
    - Autotools|CMake: Make test suite require a C++11 compiler
    - CMake: Require CMake &gt;=3.5.0
    - CMake: Lowercase off_t and size_t to help a bug in Meson
    - CMake: Sort xmlwf sources alphabetically
    - CMake|Windows: Fix generation of DLL file version info
    - CMake: Build tests/benchmark/benchmark.c as well for
      a build with -DEXPAT_BUILD_TESTS=ON
    - docs: Document the importance of isFinal + adjust tests
      accordingly
    - docs: Improve use of "NULL" and "null"
    - docs: Be specific about version of XML (XML 1.0r4)
      and version of C (C99); (XML 1.0r5 will need a sponsor.)
    - docs: reference.html: Promote function XML_ParseBuffer more
    - docs: reference.html: Add HTML anchors to XML_* macros
    - docs: reference.html: Upgrade to OK.css 1.2.0
    - docs: Fix typos
    - docs|CI: Use HTTPS URLs instead of HTTP at various places
    - Address compiler warnings
    - Address clang-tidy warnings
    - Version info bumped from 9:10:8 (libexpat*.so.1.8.10)
      to 10:0:9 (libexpat*.so.1.9.0); see https://verbump.de/
      for what these numbers do
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-304</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      <Description>Link for SUSE-SU-2025:20207-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20207-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219559</URL>
      <Description>SUSE Bug 1219559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219561</URL>
      <Description>SUSE Bug 1219561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221289</URL>
      <Description>SUSE Bug 1221289</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229930</URL>
      <Description>SUSE Bug 1229930</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229931</URL>
      <Description>SUSE Bug 1229931</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229932</URL>
      <Description>SUSE Bug 1229932</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232579</URL>
      <Description>SUSE Bug 1232579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232601</URL>
      <Description>SUSE Bug 1232601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239618</URL>
      <Description>SUSE Bug 1239618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0340/</URL>
      <Description>SUSE CVE CVE-2013-0340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15903/</URL>
      <Description>SUSE CVE CVE-2019-15903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52425/</URL>
      <Description>SUSE CVE CVE-2023-52425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52426/</URL>
      <Description>SUSE CVE CVE-2023-52426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28757/</URL>
      <Description>SUSE CVE CVE-2024-28757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45490/</URL>
      <Description>SUSE CVE CVE-2024-45490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45491/</URL>
      <Description>SUSE CVE CVE-2024-45491 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45492/</URL>
      <Description>SUSE CVE CVE-2024-45492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50602/</URL>
      <Description>SUSE CVE CVE-2024-50602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8176/</URL>
      <Description>SUSE CVE CVE-2024-8176 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libexpat1-2.7.1-1.1">
      <FullProductName ProductID="libexpat1-2.7.1-1.1">libexpat1-2.7.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libexpat1-2.7.1-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1">libexpat1-2.7.1-1.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.</Note>
    </Notes>
    <CVE>CVE-2013-0340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0340.html</URL>
        <Description>CVE-2013-0340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/805236</URL>
        <Description>SUSE Bug 805236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2019-15903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15903.html</URL>
        <Description>CVE-2019-15903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149429</URL>
        <Description>SUSE Bug 1149429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154738</URL>
        <Description>SUSE Bug 1154738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154806</URL>
        <Description>SUSE Bug 1154806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.</Note>
    </Notes>
    <CVE>CVE-2023-52425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52425.html</URL>
        <Description>CVE-2023-52425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219559</URL>
        <Description>SUSE Bug 1219559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.</Note>
    </Notes>
    <CVE>CVE-2023-52426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52426.html</URL>
        <Description>CVE-2023-52426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219561</URL>
        <Description>SUSE Bug 1219561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).</Note>
    </Notes>
    <CVE>CVE-2024-28757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28757.html</URL>
        <Description>CVE-2024-28757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221289</URL>
        <Description>SUSE Bug 1221289</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.</Note>
    </Notes>
    <CVE>CVE-2024-45490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45490.html</URL>
        <Description>CVE-2024-45490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229930</URL>
        <Description>SUSE Bug 1229930</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).</Note>
    </Notes>
    <CVE>CVE-2024-45491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45491.html</URL>
        <Description>CVE-2024-45491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229930</URL>
        <Description>SUSE Bug 1229930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229931</URL>
        <Description>SUSE Bug 1229931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).</Note>
    </Notes>
    <CVE>CVE-2024-45492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45492.html</URL>
        <Description>CVE-2024-45492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229930</URL>
        <Description>SUSE Bug 1229930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229932</URL>
        <Description>SUSE Bug 1229932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.</Note>
    </Notes>
    <CVE>CVE-2024-50602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50602.html</URL>
        <Description>CVE-2024-50602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232579</URL>
        <Description>SUSE Bug 1232579</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.</Note>
    </Notes>
    <CVE>CVE-2024-8176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libexpat1-2.7.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520207-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8176.html</URL>
        <Description>CVE-2024-8176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239618</URL>
        <Description>SUSE Bug 1239618</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
