SCIENTIFIC-LINUX-ERRATA Archives

January 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Tue, 5 Jan 2010 13:20:40 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (39 lines)
Synopsis:	Moderate: PyXML security update
Issue date: 2010-01-04
CVE Names: CVE-2009-3720

A buffer over-read flaw was found in the way PyXML's Expat parser
handled malformed UTF-8 sequences when processing XML files. A
specially-crafted XML file could cause Python applications using PyXML's
Expat parser to crash while parsing the file. (CVE-2009-3720)

This update makes PyXML use the system Expat library rather than its own
internal copy; therefore, users must install the December 2009 expat
security update, together with this PyXML update to resolve the
CVE-2009-3720 issue.

After installing this update along with the December 2009 expat security
  update, applications using the PyXML library must be restarted for the
update to take effect.

SL 4.x

      SRPMS:
PyXML-0.8.3-6.el4_8.2.src.rpm
      i386:
PyXML-0.8.3-6.el4_8.2.i386.rpm
      x86_64:
PyXML-0.8.3-6.el4_8.2.x86_64.rpm

SL 5.x

      SRPMS:
PyXML-0.8.4-4.el5_4.2.src.rpm
      i386:
PyXML-0.8.4-4.el5_4.2.i386.rpm
      x86_64:
PyXML-0.8.4-4.el5_4.2.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2