First published: Mon Jan 04 2010(Updated: )
PyXML provides XML libraries for Python. The distribution contains a<br>validating XML parser, an implementation of the SAX and DOM programming<br>interfaces, and an interface to the Expat parser.<br>A buffer over-read flaw was found in the way PyXML's Expat parser handled<br>malformed UTF-8 sequences when processing XML files. A specially-crafted<br>XML file could cause Python applications using PyXML's Expat parser to<br>crash while parsing the file. (CVE-2009-3720)<br>This update makes PyXML use the system Expat library rather than its own<br>internal copy; therefore, users must install the RHSA-2009:1625 expat<br>update together with this PyXML update to resolve the CVE-2009-3720 issue.<br>All PyXML users should upgrade to this updated package, which changes PyXML<br>to use the system Expat library. After installing this update along with<br>RHSA-2009:1625, applications using the PyXML library must be restarted for<br>the update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
Python Pyxml |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0002 is classified as moderate.
To fix RHSA-2010:0002, it is recommended to update the PyXML package to the latest version provided by your distribution.
RHSA-2010:0002 describes a buffer over-read flaw in the Expat parser used by PyXML.
RHSA-2010:0002 affects the PyXML library which provides XML parsing capabilities for Python.
The vulnerability in RHSA-2010:0002 can potentially be exploited through specially crafted XML data leading to an application crash or unexpected behavior.