There are 7 open security issues in bookworm.
6 issues left for the package maintainer to handle:
- CVE-2025-66382:
(postponed; to be fixed through a stable update)
In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
- CVE-2026-24515:
(needs triaging)
In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
- CVE-2026-25210:
(needs triaging)
In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
- CVE-2026-32776:
(needs triaging)
libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
- CVE-2026-32777:
(needs triaging)
libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
- CVE-2026-32778:
(needs triaging)
libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
You can find information about how to handle these issues in the security team's documentation.
1 ignored issue:
- CVE-2025-59375:
libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.