Описание
ELSA-2010-0002: PyXML security update (MODERATE)
[0.8.4-4.2]
- Use system expat library Resolves: #531852
[0.8.4-4.1]
- Fix buffer over read Resolves: #531852
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
PyXML
0.8.4-4.el5_4.2
Oracle Linux x86_64
PyXML
0.8.4-4.el5_4.2
Oracle Linux i386
PyXML
0.8.4-4.el5_4.2
Связанные CVE
Связанные уязвимости
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat ...
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.