Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/libxml2@2.9.13-1
purl pkg:alpm/archlinux/libxml2@2.9.13-1
Next non-vulnerable version 2.9.14-1
Latest non-vulnerable version 2.9.14-1
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-cbm2-cez4-bqgh
Aliases:
CVE-2022-23308
Use After Free `valid.c` in libxml2 before 2.9.13 has a use-after-free of `ID` and `IDREF` attributes.
2.9.14-1
Affected by 0 other vulnerabilities.
VCID-s9r4-a3uz-4yhp
Aliases:
CVE-2022-29824
Integer Overflow or Wraparound In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
2.9.14-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T18:25:09.669739+00:00 Arch Linux Importer Affected by VCID-cbm2-cez4-bqgh https://security.archlinux.org/AVG-2726 38.0.0
2026-04-01T18:25:09.645340+00:00 Arch Linux Importer Affected by VCID-s9r4-a3uz-4yhp https://security.archlinux.org/AVG-2726 38.0.0