Search for packages
| purl | pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u6?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-31w8-13b6-8beh | libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 |
CVE-2025-24928
|
| VCID-aasn-u7fd-8bhy | Improper Restriction of Operations within the Bounds of a Memory Buffer Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. |
CVE-2023-39615
|
| VCID-c9ds-faa9-t7be | libxml2: Use-After-Free in libxml2 |
CVE-2024-56171
|
| VCID-d68t-f8j1-h3am | Use After Free When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free. |
CVE-2024-25062
|
| VCID-hafa-bcpu-8uaj | libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch |
CVE-2025-27113
|
| VCID-pdv9-xrh8-d3fz | Use After Free This advisory has been marked as False Positive and removed. |
CVE-2023-45322
|
| VCID-qh44-gavt-rbdw | libxml: use-after-free in xmlXIncludeAddNode |
CVE-2022-49043
|