libxml2-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libxml2-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Stack-based Buffer Overflow

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Stack-based Buffer Overflow

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Stack-based Buffer Overflow

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Use After Free

<0:2.9.13-9.el9_4
  • H
Stack-based Buffer Overflow

<0:2.9.13-6.el9_5.2
  • H
Use After Free

<0:2.9.13-6.el9_5.2
  • H
Use After Free

<0:2.9.13-6.el9_5.1
  • H
Stack-based Buffer Overflow

<0:2.9.13-3.el9_2.6
  • H
Use After Free

<0:2.9.13-3.el9_2.6
  • H
Stack-based Buffer Overflow

<0:2.9.13-3.el9_2.6
  • H
Use After Free

<0:2.9.13-3.el9_2.6
  • H
Stack-based Buffer Overflow

<0:2.9.13-3.el9_2.6
  • H
Use After Free

<0:2.9.13-3.el9_2.6
  • H
Stack-based Buffer Overflow

<0:2.9.13-1.el9_0.4
  • H
Use After Free

<0:2.9.13-1.el9_0.4
  • H
Stack-based Buffer Overflow

<0:2.9.13-6.el9_5.2
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<0:2.9.13-6.el9_5.2
  • H
Use After Free

<0:2.9.13-3.el9_2.4
  • H
Use After Free

<0:2.9.13-3.el9_2.4
  • H
Use After Free

<0:2.9.13-3.el9_2.4
  • H
Use After Free

<0:2.9.13-6.el9_5.1
  • M
Use After Free

<0:2.9.13-6.el9_4
  • M
Out-of-Bounds

<0:2.9.13-5.el9_3
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Double Free

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Use After Free

<0:2.9.13-3.el9_2.3
  • M
Use After Free

<0:2.9.13-3.el9_2.3
  • M
Use After Free

<0:2.9.13-3.el9_2.3
  • L
Buffer Over-read

*
  • M
Use After Free

<0:2.9.13-6.el9_4
  • L
Use After Free

*
  • M
Out-of-Bounds

<0:2.9.13-5.el9_3
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Improper Input Validation

<0:2.9.13-3.el9_2.1
  • M
Double Free

<0:2.9.13-3.el9_1
  • M
Double Free

<0:2.9.13-3.el9_1
  • M
Double Free

<0:2.9.13-3.el9_1
  • M
Double Free

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-3.el9_1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1
  • M
Integer Overflow or Wraparound

<0:2.9.13-1.el9_0.1