There are 7 open security issues in bookworm.
3 important issues:
- CVE-2026-32776:
libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
- CVE-2026-32777:
libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
- CVE-2026-32778:
libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
3 issues left for the package maintainer to handle:
- CVE-2025-66382:
(postponed; to be fixed through a stable update)
In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
- CVE-2026-24515:
(needs triaging)
In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
- CVE-2026-25210:
(needs triaging)
In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
You can find information about how to handle these issues in the security team's documentation.
1 ignored issue:
- CVE-2025-59375:
libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.