{"id":"DSA-5073-1","summary":"expat - security update","modified":"2026-03-09T02:09:22.806264Z","published":"2022-02-12T00:00:00Z","upstream":["CVE-2021-45960","CVE-2021-46143","CVE-2022-22822","CVE-2022-22823","CVE-2022-22824","CVE-2022-22825","CVE-2022-22826","CVE-2022-22827","CVE-2022-23852","CVE-2022-23990","DEBIAN-CVE-2021-45960","DEBIAN-CVE-2021-46143","DEBIAN-CVE-2022-22822","DEBIAN-CVE-2022-22823","DEBIAN-CVE-2022-22824","DEBIAN-CVE-2022-22825","DEBIAN-CVE-2022-22826","DEBIAN-CVE-2022-22827","DEBIAN-CVE-2022-23852","DEBIAN-CVE-2022-23990"],"affected":[{"package":{"name":"expat","ecosystem":"Debian:10","purl":"pkg:deb/debian/expat?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.6-2+deb10u2"}]}],"versions":["2.2.6-2","2.2.6-2+deb10u1"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5073-1.json"}},{"package":{"name":"expat","ecosystem":"Debian:11","purl":"pkg:deb/debian/expat?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.10-2+deb11u1"}]}],"versions":["2.2.10-2"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5073-1.json"}}],"schema_version":"1.7.3"}