Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0002

Опубликовано: 04 янв. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0002: PyXML security update (MODERATE)

[0.8.4-4.2]

  • Use system expat library Resolves: #531852

[0.8.4-4.1]

  • Fix buffer over read Resolves: #531852

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

PyXML

0.8.4-4.el5_4.2

Oracle Linux x86_64

PyXML

0.8.4-4.el5_4.2

Oracle Linux i386

PyXML

0.8.4-4.el5_4.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

redhat
больше 16 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

nvd
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

debian
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat ...

github
около 3 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.