File _patchinfo of Package patchinfo.25883
<patchinfo incident="25883">
<issue tracker="bnc" id="1201978">VUL-0: CVE-2016-3709: libxml2,libxml2-python,rubygem-nokogiri: Cross-site scripting vulnerability in libxml</issue>
<issue tracker="bnc" id="1204367">VUL-0: CVE-2022-40304: libxml2: Fix dict corruption caused by entity reference cycles</issue>
<issue tracker="bnc" id="1204366">VUL-0: CVE-2022-40303: libxml2: Fix integer overflows with XML_PARSE_HUGE</issue>
<issue tracker="cve" id="2016-3709"/>
<issue tracker="cve" id="2022-40303"/>
<issue tracker="cve" id="2022-40304"/>
<packager>pmonrealgonzalez</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for libxml2</summary>
<description>This update for libxml2 fixes the following issues:
- CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).
- CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE (bsc#1204366).
- CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
</description>
</patchinfo>