Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7?arch=2
purl pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7?arch=2
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 1.9
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-ayqh-mrmn-tqgg
Aliases:
CVE-2011-0216
libxml2: Off-by-one error leading to heap-based buffer overflow in encoding There are no reported fixed by versions.
VCID-dzxg-zych-1yd1
Aliases:
CVE-2011-3905
libxml2 out of bounds read There are no reported fixed by versions.
VCID-hz3p-4d8c-z7gm
Aliases:
CVE-2010-4008
Improper Restriction of Operations within the Bounds of a Memory Buffer libxml2, as used in Google Chrome, Apple Safari, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document. There are no reported fixed by versions.
VCID-js7v-8a5j-h7ba
Aliases:
CVE-2011-2834
Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code and local root privilege escalation. There are no reported fixed by versions.
VCID-ttud-e3xr-dudd
Aliases:
CVE-2011-1944
Integer Overflow Integer overflow in xpath.c in libxml2, and libxml, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. There are no reported fixed by versions.
VCID-z8ds-n38f-2uby
Aliases:
CVE-2011-3919
A boundary error in libxml2 could result in execution of arbitrary code or Denial of Service. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:56:56.466413+00:00 RedHat Importer Affected by VCID-hz3p-4d8c-z7gm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4008.json 38.0.0
2026-04-01T14:56:35.530593+00:00 RedHat Importer Affected by VCID-ttud-e3xr-dudd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1944.json 38.0.0
2026-04-01T14:56:26.662074+00:00 RedHat Importer Affected by VCID-ayqh-mrmn-tqgg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0216.json 38.0.0
2026-04-01T14:56:18.774799+00:00 RedHat Importer Affected by VCID-js7v-8a5j-h7ba https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2834.json 38.0.0
2026-04-01T14:56:09.348745+00:00 RedHat Importer Affected by VCID-dzxg-zych-1yd1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3905.json 38.0.0
2026-04-01T14:55:59.706094+00:00 RedHat Importer Affected by VCID-z8ds-n38f-2uby https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3919.json 38.0.0