File _patchinfo of Package patchinfo.37640
<patchinfo incident="37640"> <issue tracker="cve" id="2025-24928"/> <issue tracker="cve" id="2025-27113"/> <issue tracker="cve" id="2024-56171"/> <issue tracker="bnc" id="1237363">VUL-0: CVE-2024-56171: libxml2: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c</issue> <issue tracker="bnc" id="1237418">VUL-0: CVE-2025-27113: libxml2: libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch</issue> <issue tracker="bnc" id="1237370">VUL-0: CVE-2025-24928: libxml2: stack-based buffer overflow in xmlSnprintfElements in valid.c</issue> <packager>pgajdos</packager> <rating>important</rating> <category>security</category> <summary>Security update for libxml2</summary> <description>This update for libxml2 fixes the following issues: - CVE-2024-56171: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c (bsc#1237363). - CVE-2025-24928: stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370). - CVE-2025-27113: NULL pointer dereference in xmlPatMatch in pattern.c (bsc#1237418). </description> </patchinfo>