{"id":"DLA-2904-1","summary":"expat - security update","modified":"2026-03-09T01:18:56.856358Z","published":"2022-01-30T00:00:00Z","upstream":["CVE-2021-45960","CVE-2021-46143","CVE-2022-22822","CVE-2022-22823","CVE-2022-22824","CVE-2022-22825","CVE-2022-22826","CVE-2022-22827","CVE-2022-23852","CVE-2022-23990","DEBIAN-CVE-2021-45960","DEBIAN-CVE-2021-46143","DEBIAN-CVE-2022-22822","DEBIAN-CVE-2022-22823","DEBIAN-CVE-2022-22824","DEBIAN-CVE-2022-22825","DEBIAN-CVE-2022-22826","DEBIAN-CVE-2022-22827","DEBIAN-CVE-2022-23852","DEBIAN-CVE-2022-23990"],"affected":[{"package":{"name":"expat","ecosystem":"Debian:9","purl":"pkg:deb/debian/expat?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0-2+deb9u4"}]}],"versions":["2.2.0-2","2.2.0-2+deb9u1","2.2.0-2+deb9u2","2.2.0-2+deb9u3"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dla-osv/DLA-2904-1.json"}}],"schema_version":"1.7.3"}