File _patchinfo of Package patchinfo.2672

<patchinfo incident="2672">
  <issue id="981550" tracker="bnc">VUL-0: CVE-2016-4449: libxml2: Inappropriate fetch of entities content</issue>
  <issue id="981549" tracker="bnc">VUL-0: CVE-2016-4448: libxml2: Format string vulnerability</issue>
  <issue id="978395" tracker="bnc">VUL-1: CVE-2016-4483: libxml2: out-of-bounds read parsing an XML using recover mode</issue>
  <issue id="981111" tracker="bnc">VUL-0: CVE-2016-1837: libxml2: Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral</issue>
  <issue id="981112" tracker="bnc">VUL-0: CVE-2016-1838: libxml2: Heap-based buffer overread in xmlParserPrintFileContextInternal</issue>
  <issue id="981548" tracker="bnc">VUL-0: CVE-2016-4447: libxml2: Heap-based buffer underreads due to xmlParseName</issue>
  <issue id="981114" tracker="bnc">VUL-0: CVE-2016-1839: libxml2: Heap-based buffer overread in xmlDictAddString</issue>
  <issue id="981115" tracker="bnc">VUL-1: CVE-2016-1840: libxml2: heap-buffer-overflow in xmlFAParsePosCharGroup</issue>
  <issue id="963963" tracker="bnc">VUL-0: CVE-2016-2073: libxml2: out-of-bounds read in htmlParseNameComplex()</issue>
  <issue id="981040" tracker="bnc">VUL-0: CVE-2016-1762: libxml2: Heap-based buffer overread in xmlNextChar</issue>
  <issue id="981041" tracker="bnc">VUL-0: CVE-2016-1834: libxml2: heap-buffer-overflow in xmlStrncat</issue>
  <issue id="965283" tracker="bnc">VUL-1: CVE-2015-8806: libxml2: Heap-buffer overread in libxml2/dict.c on fuzzed html input</issue>
  <issue id="981109" tracker="bnc">VUL-0: CVE-2016-1835: libxml2: Heap use-after-free in xmlSAX2AttributeNs</issue>
  <issue id="981108" tracker="bnc">VUL-0: CVE-2016-1833: libxml2: Heap-based buffer overread in htmlCurrentChar</issue>
  <issue id="CVE-2016-2073" tracker="cve" />
  <issue id="CVE-2016-4449" tracker="cve" />
  <issue id="CVE-2016-1837" tracker="cve" />
  <issue id="CVE-2016-4483" tracker="cve" />
  <issue id="CVE-2016-3705" tracker="cve" />
  <issue id="CVE-2016-4448" tracker="cve" />
  <issue id="CVE-2016-4447" tracker="cve" />
  <issue id="CVE-2016-1834" tracker="cve" />
  <issue id="CVE-2016-1840" tracker="cve" />
  <issue id="CVE-2016-1835" tracker="cve" />
  <issue id="CVE-2016-1833" tracker="cve" />
  <issue id="CVE-2016-1839" tracker="cve" />
  <issue id="CVE-2016-1838" tracker="cve" />
  <issue id="CVE-2015-8806" tracker="cve" />
  <issue id="CVE-2016-1762" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>simotek</packager>
  <description>
This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
</description>
  <summary>Security update for libxml2</summary>
</patchinfo>
openSUSE Build Service is sponsored by