File _patchinfo of Package patchinfo.37957

<patchinfo incident="37957">
  <issue tracker="cve" id="2025-27113"/>
  <issue tracker="cve" id="2024-56171"/>
  <issue tracker="cve" id="2025-24928"/>
  <issue tracker="bnc" id="1237363">VUL-0: CVE-2024-56171: libxml2: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c</issue>
  <issue tracker="bnc" id="1237370">VUL-0: CVE-2025-24928: libxml2: stack-based buffer overflow in xmlSnprintfElements in valid.c</issue>
  <issue tracker="bnc" id="1237418">VUL-0: CVE-2025-27113: libxml2: libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch</issue>
  <packager>pgajdos</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for libxml2</summary>
  <description>This update for libxml2 fixes the following issues:

- CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c (bsc#1237363).
- CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370).
- CVE-2025-27113: Fixed NULL Pointer Dereference in libxml2 xmlPatMatch (bsc#1237418).
</description>
</patchinfo>
openSUSE Build Service is sponsored by