{"affected":[{"ecosystem_specific":{"binaries":[{"libexpat1":"2.5.0-3.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"expat","purl":"pkg:rpm/suse/expat&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.5.0-3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for expat fixes the following issues:\n\n- CVE-2024-45492: detect integer overflow in function nextScaffoldPart (bsc#1229932) \n- CVE-2024-45491: detect integer overflow in dtdCopy (bsc#1229931)\n- CVE-2024-45490: reject negative len for XML_ParseBuffer (bsc#1229930)\n- CVE-2024-28757: XML Entity Expansion attack when there is isolated use of external parsers (bsc#1221289) \n","id":"SUSE-SU-2025:20045-1","modified":"2025-02-03T08:54:55Z","published":"2025-02-03T08:54:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520045-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-28757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45492"}],"related":["CVE-2024-28757","CVE-2024-45490","CVE-2024-45491","CVE-2024-45492"],"summary":"Security update for expat","upstream":["CVE-2024-28757","CVE-2024-45490","CVE-2024-45491","CVE-2024-45492"]}