| Name | CVE-2016-4472 | 
| Description | The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-483-1, DSA-3582-1 | 
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|
| expat (PTS) | bullseye | 2.2.10-2+deb11u5 | fixed | 
|  | bullseye (security) | 2.2.10-2+deb11u7 | fixed | 
|  | bookworm | 2.5.0-1+deb12u2 | fixed | 
|  | bookworm (security) | 2.5.0-1+deb12u1 | fixed | 
|  | trixie | 2.7.1-2 | fixed | 
|  | forky, sid | 2.7.3-1 | fixed | 
| libxmltok (PTS) | bookworm, bullseye | 1.2-4 | vulnerable | 
The information below is based on the following data on fixed versions.
Notes
[bookworm] - libxmltok <ignored> (Minor issue, no runtime dependencies left)
https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde/tree/expat/lib/xmlparse.c?diff=a238d7ea7a715ef3850c4cbdd86aeda7077b6bbc