File _patchinfo of Package patchinfo.39593
<patchinfo incident="39593">
<issue tracker="cve" id="2025-6021"/>
<issue tracker="cve" id="2025-49796"/>
<issue tracker="cve" id="2025-49794"/>
<issue tracker="cve" id="2025-6170"/>
<issue tracker="bnc" id="1244700">VUL-0: CVE-2025-6170: libxml2: stack buffer overflow may lead to a crash</issue>
<issue tracker="bnc" id="1244554">VUL-0: CVE-2025-49794: libxml2: heap use after free (UAF) can lead to Denial of service (DoS)</issue>
<issue tracker="bnc" id="1244557">VUL-0: CVE-2025-49796: libxml2: type confusion may lead to Denial of service (DoS)</issue>
<issue tracker="bnc" id="1244590">VUL-0: CVE-2025-6021: TRACKERBUG: libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2</issue>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for libxml2</summary>
<description>This update for libxml2 fixes the following issues:
- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)
- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)
- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)
- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)
</description>
</patchinfo>