{"id":"JLSEC-2025-60","summary":"libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsing...","details":"libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.","modified":"2025-11-06T23:03:26.199147Z","published":"2025-10-14T15:35:41.198Z","upstream":["CVE-2023-52425"],"database_specific":{"sources":[{"imported":"2025-10-10T21:54:56.859Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52425","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-52425","modified":"2024-11-21T08:39:43.393Z","id":"CVE-2023-52425","published":"2024-02-04T20:15:46.063Z"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/03/20/5"},{"type":"WEB","url":"https://github.com/libexpat/libexpat/pull/789"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240614-0003/"}],"affected":[{"package":{"name":"Expat_jll","ecosystem":"Julia","purl":"pkg:julia/Expat_jll?uuid=2e619515-83b5-522b-bb60-26c02a35a201"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.6.2+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-60.json"}}],"schema_version":"1.7.3"}