MGASA-2026-0061

Source
https://advisories.mageia.org/MGASA-2026-0061.html
Import Source
https://advisories.mageia.org/MGASA-2026-0061.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2026-0061
Related
  • CVE-2026-32776
  • CVE-2026-32777
  • CVE-2026-32778
Published
2026-03-20T21:17:05Z
Modified
2026-03-20T21:30:05.787633Z
Summary
Updated expat packages fix security vulnerabilities
Details

libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content. (CVE-2026-32776) libexpat before 2.7.5 allows an infinite loop while parsing DTD content. (CVE-2026-32777) libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier out-of-memory condition. (CVE-2026-32778)

References
Credits

Affected packages

Mageia:9 / expat

Package

Name
expat
Purl
pkg:rpm/mageia/expat?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.5-1.mga9

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2026-0061.json"