Search for packages
| purl | pkg:alpm/archlinux/libxml2@2.9.13-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-cbm2-cez4-bqgh
Aliases: CVE-2022-23308 |
Use After Free `valid.c` in libxml2 before 2.9.13 has a use-after-free of `ID` and `IDREF` attributes. |
Affected by 0 other vulnerabilities. |
|
VCID-s9r4-a3uz-4yhp
Aliases: CVE-2022-29824 |
Integer Overflow or Wraparound In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:25:09.669739+00:00 | Arch Linux Importer | Affected by | VCID-cbm2-cez4-bqgh | https://security.archlinux.org/AVG-2726 | 38.0.0 |
| 2026-04-01T18:25:09.645340+00:00 | Arch Linux Importer | Affected by | VCID-s9r4-a3uz-4yhp | https://security.archlinux.org/AVG-2726 | 38.0.0 |