Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1625

Опубликовано: 07 дек. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1625: expat security update (MODERATE)

[1.95.8-8.3.2]

  • add security fix for CVE-2009-3560 (#531710)

[1.95.8-8.3.1]

  • add security fix for CVE-2009-3720 (#531710)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

expat

1.95.8-8.3.el5_4.2

expat-devel

1.95.8-8.3.el5_4.2

Oracle Linux x86_64

expat

1.95.8-8.3.el5_4.2

expat-devel

1.95.8-8.3.el5_4.2

Oracle Linux i386

expat

1.95.8-8.3.el5_4.2

expat-devel

1.95.8-8.3.el5_4.2

Связанные CVE

Связанные уязвимости

fstec
почти 13 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

ubuntu
почти 16 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

redhat
больше 16 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

nvd
почти 16 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

debian
почти 16 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat ...