Debian Package Tracker
Register | Log in
Subscribe

expat

XML parsing C library - example application

Choose email to subscribe with

general
  • source: expat (main)
  • version: 2.8.0-2
  • maintainer: Laszlo Boszormenyi (GCS) (DMD)
  • arch: any
  • std-ver: 4.7.2
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.2.10-2+deb11u5
  • o-o-sec: 2.2.10-2+deb11u7
  • oldstable: 2.5.0-1+deb12u2
  • old-sec: 2.5.0-1+deb12u1
  • stable: 2.7.1-2
  • testing: 2.8.0-1
  • unstable: 2.8.0-2
versioned links
  • 2.2.10-2+deb11u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.2.10-2+deb11u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.0-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.0-1+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.8.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.8.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • expat
  • libexpat1
  • libexpat1-dev (2 bugs: 0, 2, 0, 0)
  • libexpat1-udeb
action needed
A new upstream version is available: 2.8.1 high
A new upstream version 2.8.1 is available, you should consider packaging it.
Created: 2026-05-14 Last update: 2026-05-14 18:30
9 security issues in trixie high

There are 9 open security issues in trixie.

1 important issue:
  • CVE-2026-45186: In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
8 issues left for the package maintainer to handle:
  • CVE-2025-59375: (needs triaging) libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
  • CVE-2025-66382: (postponed; to be fixed through a stable update) In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
  • CVE-2026-24515: (needs triaging) In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
  • CVE-2026-25210: (needs triaging) In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
  • CVE-2026-32776: (needs triaging) libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
  • CVE-2026-32777: (needs triaging) libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
  • CVE-2026-32778: (needs triaging) libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
  • CVE-2026-41080: (needs triaging) libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-09-15 Last update: 2026-05-11 06:34
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-66382: In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
Created: 2025-11-28 Last update: 2026-05-11 06:34
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-66382: In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
  • CVE-2026-45186: In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
Created: 2025-11-28 Last update: 2026-05-11 06:34
10 security issues in bullseye high

There are 10 open security issues in bullseye.

1 important issue:
  • CVE-2026-45186: In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
7 issues postponed or untriaged:
  • CVE-2025-66382: (postponed; to be fixed through a stable update) In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
  • CVE-2026-24515: (postponed; to be fixed through a stable update) In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
  • CVE-2026-25210: (postponed; to be fixed through a stable update) In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
  • CVE-2026-32776: (postponed; to be fixed through a stable update) libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
  • CVE-2026-32777: (postponed; to be fixed through a stable update) libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
  • CVE-2026-32778: (postponed; to be fixed through a stable update) libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
  • CVE-2026-41080: (postponed; to be fixed through a stable update) libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.
2 ignored issues:
  • CVE-2024-8176: A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
  • CVE-2025-59375: libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
Created: 2026-05-10 Last update: 2026-05-11 06:34
9 security issues in bookworm high

There are 9 open security issues in bookworm.

1 important issue:
  • CVE-2026-45186: In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
7 issues left for the package maintainer to handle:
  • CVE-2025-66382: (postponed; to be fixed through a stable update) In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
  • CVE-2026-24515: (needs triaging) In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
  • CVE-2026-25210: (needs triaging) In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
  • CVE-2026-32776: (needs triaging) libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
  • CVE-2026-32777: (needs triaging) libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
  • CVE-2026-32778: (needs triaging) libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
  • CVE-2026-41080: (needs triaging) libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2025-59375: libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
Created: 2025-09-15 Last update: 2026-05-11 06:34
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 2-day delay is over. Check why.
Created: 2026-05-13 Last update: 2026-05-14 21:01
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-05-11 Last update: 2026-05-11 06:31
debian/patches: 10 patches to forward upstream low

Among the 12 debian patches available in version 2.8.0-2 of the package, we noticed the following issues:

  • 10 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2026-05-11 Last update: 2026-05-11 09:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-05-11 00:01
testing migrations
  • excuses:
    • Migration status for expat (2.8.0-1 to 2.8.0-2): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for android-platform-frameworks-base/1:14~beta1-5: amd64: Pass, arm64: Pass, i386: Pass, riscv64: Test triggered
    • ∙ ∙ Autopkgtest for astropy/7.2.0-1: amd64: Pass, arm64: Regression ♻ (reference ♻), i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for avahi/0.8-18: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for cmake: riscv64: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for dbus/1.16.2-4: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for dbus-broker/37-5: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for dbus-glib/0.114-2: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for debsig-verify/0.34: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for dovecot/1:2.4.3+dfsg1-2: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for elinks/0.19.1-2: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for gdcm/3.0.24-10: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for graph-tool/2.98+ds-4: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for httpdirfs-fuse/1.2.7-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for idzebra/2.2.10-2: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for libapp-info-perl/0.57-4: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for libhangul/0.2.0-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for libreoffice/4:26.2.3.2-2: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), loong64: Test triggered (will not be considered a regression) ♻ (reference ♻), ppc64el: Pass, riscv64: Regression ♻ (reference ♻), s390x: Pass
    • ∙ ∙ Autopkgtest for libwmf/0.2.14-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for mesa/26.0.6-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for mira/4.9.6-12: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for mpd/0.24.8-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for nginx/1.30.0-2: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for osm2pgrouting/3.0.0-1: amd64: Pass, arm64: Failed (not a regression) ♻ (reference ♻), loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for policykit-1/127-3: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for pyosmium/4.3.1-1: amd64: Pass, arm64: Pass, i386: Failed (not a regression) ♻ (reference ♻), loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for pypy3/7.3.22+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for python3.13/3.13.12-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for python3.14/3.14.4-2: amd64: Pass, arm64: Pass, i386: Failed (not a regression) ♻ (reference ♻), loong64: Test triggered, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for teckit/2.5.13+ds-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for udunits/2.2.28-8: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, loong64: Test triggered, ppc64el: No tests, superficial or marked flaky ♻, riscv64: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for unbound/1.24.2-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/e/expat.html
    • ∙ ∙ Reproducibility check waiting for results on amd64 - info
    • ∙ ∙ Reproducibility issues ignored for src:expat as requested by elbrus
    • ∙ ∙ Reproducibility check waiting for results on arm64 - info
    • ∙ ∙ Reproducibility issues ignored for src:expat as requested by elbrus
    • ∙ ∙ Reproducibility check waiting for results on armhf - info
    • ∙ ∙ Reproducibility issues ignored for src:expat as requested by elbrus
    • ∙ ∙ Reproducibility check waiting for results on i386 - info
    • ∙ ∙ Reproducibility issues ignored for src:expat as requested by elbrus
    • ∙ ∙ 4 days old (needed 2 days)
    • Not considered
news
[rss feed]
  • [2026-05-10] Accepted expat 2.8.0-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2026-04-27] expat 2.8.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-25] Accepted expat 2.8.0-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2026-03-22] expat 2.7.5-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-17] Accepted expat 2.7.5-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2026-02-03] expat 2.7.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-31] Accepted expat 2.7.4-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2026-01-26] expat 2.7.3-2 MIGRATED to testing (Debian testing watch)
  • [2026-01-23] Accepted expat 2.7.3-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-09-28] expat 2.7.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-24] Accepted expat 2.7.3-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-09-19] expat 2.7.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-19] expat 2.7.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-16] Accepted expat 2.7.2-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-07-21] expat 2.7.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-07-17] Accepted expat 2.7.1-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-05-31] Accepted expat 2.5.0-1+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2025-04-30] Accepted expat 2.2.10-2+deb11u7 (source) into oldstable-security (Thorsten Alteholz)
  • [2025-03-30] expat 2.7.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-27] Accepted expat 2.7.1-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2025-03-14] Accepted expat 2.7.0-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2024-11-14] expat 2.6.4-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-08] Accepted expat 2.6.4-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2024-10-31] expat 2.6.3-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-27] Accepted expat 2.6.3-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2024-09-19] Accepted expat 2.2.10-2+deb11u6 (source) into oldstable-security (Guilhem Moulin)
  • [2024-09-18] Accepted expat 2.5.0-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2024-09-17] Accepted expat 2.5.0-1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2024-09-10] expat 2.6.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-04] Accepted expat 2.6.3-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.7.4-1
  • 6 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing