The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html
https://bugzilla.redhat.com/show_bug.cgi?id=533174
http://www.ubuntu.com/usn/USN-890-6
http://www.ubuntu.com/usn/USN-890-1
http://www.securitytracker.com/id?1023278
http://www.securityfocus.com/bid/37203
http://www.debian.org/security/2009/dsa-1953
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026
http://marc.info/?l=bugtraq&m=130168502603566&w=2
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165