{"id":"JLSEC-2025-45","summary":"build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.","details":"build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.","modified":"2025-11-06T23:02:59.761531Z","published":"2025-10-14T15:35:41.198Z","upstream":["CVE-2022-22823"],"database_specific":{"sources":[{"url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-22823","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22823","imported":"2025-10-10T21:54:56.846Z","published":"2022-01-10T14:12:56.270Z","modified":"2025-05-05T17:17:52.690Z","id":"CVE-2022-22823"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2022/01/17/3"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"type":"WEB","url":"https://github.com/libexpat/libexpat/pull/539"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202209-24"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5073"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2022-05"}],"affected":[{"package":{"name":"Expat_jll","ecosystem":"Julia","purl":"pkg:julia/Expat_jll?uuid=2e619515-83b5-522b-bb60-26c02a35a201"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.4.4+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-45.json"}}],"schema_version":"1.7.3"}