{"affected":[{"ecosystem_specific":{"binaries":[{"libxslt-devel":"1.1.32-3.3.1","libxslt-tools":"1.1.32-3.3.1","libxslt1":"1.1.32-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"libxslt","purl":"pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.32-3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libxslt fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2019-11068: Fixed a protection mechanism bypass where callers of \n  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an\n  error (bsc#1132160).\n","id":"SUSE-SU-2019:1221-2","modified":"2019-07-01T13:03:38Z","published":"2019-07-01T13:03:38Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20191221-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1132160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11068"}],"related":["CVE-2019-11068"],"summary":"Security update for libxslt","upstream":["CVE-2019-11068"]}