JLSEC-2025-41

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-41.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-41.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-41
Upstream
Published
2025-10-14T15:35:41.198Z
Modified
2025-11-03T00:18:36.150288Z
Summary
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to ...
Details

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XMLGetCurrentLineNumber (or XMLGetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

Database specific
{
    "sources": [
        {
            "modified": "2025-05-30T20:15:23.620Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-15903",
            "id": "CVE-2019-15903",
            "published": "2019-09-04T06:15:10.877Z",
            "imported": "2025-10-10T21:54:56.818Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / Expat_jll

Package

Name
Expat_jll
Purl
pkg:julia/Expat_jll?uuid=2e619515-83b5-522b-bb60-26c02a35a201

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.10+0