File _patchinfo of Package patchinfo.6602
<patchinfo incident="6602">
<issue id="1077993" tracker="bnc">VUL-0: CVE-2017-15412: libxml2: use after free in libxml</issue>
<issue id="1078813" tracker="bnc">VUL-0: CVE-2016-5131: libxml2: chromium-browser: use-after-free in libxml</issue>
<issue id="1078806" tracker="bnc">VUL-0: CVE-2017-5130: libxml2: remote buffer overflow</issue>
<issue id="2016-5131" tracker="cve" />
<issue id="2017-5130" tracker="cve" />
<issue id="2017-15412" tracker="cve" />
<category>security</category>
<summary>Security update for libxml2</summary>
<rating>moderate</rating>
<packager>jsegitz</packager>
<description>This update for libxml2 fixes one issue.
This security issue was fixed:
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
remote attackers to cause a denial of service or possibly have
unspecified other impact via vectors related to the XPointer range-to
function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
xmlMemoryStrdup() (bsc#1078806)
</description>
</patchinfo>