Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:ebuild/dev-libs/libxml2@2.10.2
purl pkg:ebuild/dev-libs/libxml2@2.10.2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-cbm2-cez4-bqgh Use After Free `valid.c` in libxml2 before 2.9.13 has a use-after-free of `ID` and `IDREF` attributes. CVE-2022-23308
VCID-s9r4-a3uz-4yhp Integer Overflow or Wraparound In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. CVE-2022-29824

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:02:00.058567+00:00 Gentoo Importer Fixing VCID-s9r4-a3uz-4yhp https://security.gentoo.org/glsa/202210-03 38.0.0
2026-04-01T13:02:00.046029+00:00 Gentoo Importer Fixing VCID-cbm2-cez4-bqgh https://security.gentoo.org/glsa/202210-03 38.0.0