File _patchinfo of Package patchinfo.23790

<patchinfo incident="23790">
  <issue tracker="bnc" id="1196490">VUL-0: CVE-2022-23308: libxml2,rubygem-nokogiri: Use-after-free of ID and IDREF attributes</issue>
  <issue tracker="bnc" id="1199132">VUL-0: CVE-2022-29824: libxml2, libxml2-python, python-libxml2-python: integer overflow leading to out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*)</issue>
  <issue tracker="cve" id="2022-23308"/>
  <issue tracker="cve" id="2022-29824"/>
  <packager>david.anes</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for libxml2</summary>
  <description>This update for libxml2 fixes the following issues:

Update to 2.9.14:

- CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*) (bsc#1199132).

Update to version 2.9.13:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes. (bsc#1196490)
</description>
</patchinfo>
openSUSE Build Service is sponsored by