CVE-2022-23308

Summary

CVECVE-2022-23308
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-02-26 05:15:00 UTC
Updated2023-11-07 03:44:00 UTC
Descriptionvalid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Apple Ipados All All All All
Operating System Apple Iphone Os All All All All
Operating System Apple Macos All All All All
Operating System Apple Macos 10.15.7 All All All
Operating System Apple Macos 10.15.7 security_update_2020-001 All All
Operating System Apple Macos 10.15.7 security_update_2021-001 All All
Operating System Apple Macos 10.15.7 security_update_2021-002 All All
Operating System Apple Macos 10.15.7 security_update_2021-003 All All
Operating System Apple Macos 10.15.7 security_update_2021-004 All All
Operating System Apple Macos 10.15.7 security_update_2021-005 All All
Operating System Apple Macos 10.15.7 security_update_2021-006 All All
Operating System Apple Macos 10.15.7 security_update_2021-007 All All
Operating System Apple Macos 10.15.7 security_update_2021-008 All All
Operating System Apple Macos 10.15.7 security_update_2022-001 All All
Operating System Apple Macos 10.15.7 security_update_2022-003 All All
Operating System Apple Mac Os X All All All All
Operating System Apple Mac Os X 10.15.7 All All All
Operating System Apple Mac Os X 10.15.7 security_update_2020-001 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-001 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-002 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-003 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-004 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-005 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-006 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-007 All All
Operating System Apple Mac Os X 10.15.7 security_update_2021-008 All All
Operating System Apple Mac Os X 10.15.7 security_update_2022-001 All All
Operating System Apple Mac Os X 10.15.7 security_update_2022-003 All All
Operating System Apple Tvos All All All All
Operating System Apple Watchos All All All All
Operating System Debian Debian Linux 9.0 All All All
Operating System Fedoraproject Fedora 34 All All All
Application Netapp Active Iq Unified Manager - All All All
Operating System Netapp Bootstrap Os - All All All
Application Netapp Clustered Data Ontap - All All All
Application Netapp Clustered Data Ontap Antivirus Connector - All All All
Hardware Netapp H300e - All All All
Operating System Netapp H300e Firmware - All All All
Hardware Netapp H300s - All All All
Operating System Netapp H300s Firmware - All All All
Hardware Netapp H410c - All All All
Operating System Netapp H410c Firmware - All All All
Hardware Netapp H410s - All All All
Operating System Netapp H410s Firmware - All All All
Hardware Netapp H500e - All All All
Operating System Netapp H500e Firmware - All All All
Hardware Netapp H500s - All All All
Operating System Netapp H500s Firmware - All All All
Hardware Netapp H700e - All All All
Operating System Netapp H700e Firmware - All All All
Hardware Netapp H700s - All All All
Operating System Netapp H700s Firmware - All All All
Hardware Netapp Hci Compute Node - All All All
Application Netapp Manageability Software Development Kit - All All All
Application Netapp Ontap Select Deploy Administration Utility - All All All
Application Netapp Smi-s Provider - All All All
Application Netapp Snapdrive - All All All
Application Netapp Snapmanager - All All All
Application Netapp Solidfire Enterprise Sds Hci Storage Node - All All All
Application Netapp Solidfire Hci Management Node - All All All
Application Oracle Communications Cloud Native Core Binding Support Function 22.2.0 All All All
Application Oracle Communications Cloud Native Core Network Function Cloud Native Environment 22.1.0 All All All
Application Oracle Communications Cloud Native Core Network Repository Function 22.1.2 All All All
Application Oracle Communications Cloud Native Core Network Repository Function 22.2.0 All All All
Application Oracle Communications Cloud Native Core Network Slice Selection Function 22.1.1 All All All
Application Oracle Communications Cloud Native Core Unified Data Repository 22.2.0 All All All
Application Oracle Mysql Workbench All All All All
Application Oracle Zfs Storage Appliance Kit 8.8 All All All
Application Xmlsoft Libxml2 All All All All

References

ReferenceSourceLinkTags
libxml2: Multiple Vulnerabilities (GLSA 202210-03) — Gentoo security GENTOO security.gentoo.org
About the security content of iOS 15.5 and iPadOS 15.5 - Apple Support CONFIRM support.apple.com
About the security content of macOS Big Sur 11.6.6 - Apple Support CONFIRM support.apple.com
Full Disclosure: APPLE-SA-2022-05-16-2 macOS Monterey 12.4 FULLDISC seclists.org
About the security content of macOS Monterey 12.4 - Apple Support CONFIRM support.apple.com
CVE-2022-23308 Libxml2 Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
[SECURITY] [DLA 2972-1] libxml2 security update MLIST lists.debian.org
[SECURITY] Fedora 34 Update: libxml2-2.9.13-1.fc34 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
NEWS · v2.9.13 · GNOME / libxml2 · GitLab MISC gitlab.gnome.org
Full Disclosure: APPLE-SA-2022-05-16-5 watchOS 8.6 FULLDISC seclists.org
About the security content of Security Update 2022-004 Catalina - Apple Support CONFIRM support.apple.com
About the security content of watchOS 8.6 - Apple Support CONFIRM support.apple.com
Full Disclosure: APPLE-SA-2022-05-16-6 tvOS 15.5 FULLDISC seclists.org
About the security content of tvOS 15.5 - Apple Support CONFIRM support.apple.com
Full Disclosure: APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5 FULLDISC seclists.org
[SECURITY] Fedora 34 Update: libxml2-2.9.13-1.fc34 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
Full Disclosure: APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC seclists.org
[CVE-2022-23308] Use-after-free of ID and IDREF attributes · GNOME/libxml2@652dd12 · GitHub CONFIRM github.com
Full Disclosure: APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina FULLDISC seclists.org
Oracle Critical Patch Update Advisory - July 2022 N/A www.oracle.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159707 Oracle Enterprise Linux Security Update for libxml2 (ELSA-2022-0899)
  • 179176 Debian Security Update for libxml2 (DLA 2972-1)
  • 179208 Debian Security Update for libxml2 (CVE-2022-23308)
  • 198697 Ubuntu Security Notification for libxml2 Vulnerability (USN-5324-1)
  • 198787 Ubuntu Security Notification for libxml2 Vulnerabilities (USN-5422-1)
  • 240152 Red Hat Update for libxml2 (RHSA-2022:0899)
  • 240235 Red Hat Update for JBoss Core Services (RHSA-2022:1389)
  • 282425 Fedora Security Update for libxml2 (FEDORA-2022-b661dea83d)
  • 282462 Fedora Security Update for libxml2 (FEDORA-2022-050c712ed7)
  • 296063 Oracle Solaris 11.4 Support Repository Update (SRU) 45.119.2 Missing (CPUAPR2022)
  • 354006 Amazon Linux Security Advisory for libxml2 : ALAS2-2022-1826
  • 354464 Amazon Linux Security Advisory for libxml2 : ALAS2022-2022-198
  • 354486 Amazon Linux Security Advisory for libxml2 : ALAS2022-2022-068
  • 354638 Amazon Linux Security Advisory for libxml2 : AL2012-2022-370
  • 354929 Amazon Linux Security Advisory for libxml2 : ALAS-2023-1743
  • 355209 Amazon Linux Security Advisory for libxml2 : ALAS2023-2023-096
  • 376607 Apple macOS Security Update 2022-004 Catalina (HT213255)
  • 376608 Apple MacOS Big Sur 11.6.6 Not Installed (HT213256)
  • 376612 Apple macOS Monterey 12.4 Not Installed (HT213257)
  • 377365 Alibaba Cloud Linux Security Update for libxml2 (ALINUX3-SA-2022:0018)
  • 377726 F5 BIG-IP Libxml2 vulnerability cve-2022-23308 (K32760744)
  • 377937 Splunk Enterprise Multiple Vulnerabilities (svd-2022-0804)
  • 500344 Alpine Linux Security Update for libxml2
  • 502932 Alpine Linux Security Update for qt5-qtwebengine
  • 503231 Alpine Linux Security Update for qt5-qtwebengine
  • 504107 Alpine Linux Security Update for libxml2
  • 506188 Alpine Linux Security Update for qt5-qtwebengine
  • 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
  • 610416 Apple iOS 15.5 and iPadOS 15.5 Security Update Missing (HT213258)
  • 6120010 Google COS Security Update for dev-libs/libxml2 (CVE-2022-23308)
  • 671562 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1574)
  • 671602 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1541)
  • 671675 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1741)
  • 671744 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1810)
  • 671750 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1793)
  • 671794 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1870)
  • 671803 EulerOS Security Update for libxml2 (EulerOS-SA-2022-1846)
  • 710642 Gentoo Linux libxml2 Multiple Vulnerabilities (GLSA 202210-03)
  • 751855 SUSE Enterprise Linux Security Update for python-libxml2-python (SUSE-SU-2022:0802-1)
  • 751859 OpenSUSE Security Update for python-libxml2-python (openSUSE-SU-2022:0802-1)
  • 752068 SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2022:1308-1)
  • 752156 SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2022:1750-1)
  • 752389 SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2022:2552-1)
  • 753147 SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2022:14904-1)
  • 900725 Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (8851)
  • 901008 Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (8862-1)
  • 940468 AlmaLinux Security Update for libxml2 (ALSA-2022:0899)
  • 960820 Rocky Linux Security Update for libxml2 (RLSA-2022:0899)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report