Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (5)
| Vulnerability |
Summary |
Aliases |
|
VCID-aasn-u7fd-8bhy
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file.
|
CVE-2023-39615
|
|
VCID-d68t-f8j1-h3am
|
Use After Free
When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
|
CVE-2024-25062
|
|
VCID-drkd-yykc-ayge
|
libxml2: Out-of-Bounds Read in libxml2
|
CVE-2025-32414
|
|
VCID-pdv9-xrh8-d3fz
|
Use After Free
This advisory has been marked as False Positive and removed.
|
CVE-2023-45322
|
|
VCID-qp6y-dt1j-97df
|
libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
|
CVE-2025-32415
|