[xml/sgml-pkgs] Bug#988603: marked as done (libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms)

Debian Bug Tracking System owner at bugs.debian.org
Sat Jun 12 11:51:07 BST 2021


Your message dated Sat, 12 Jun 2021 10:47:08 +0000
with message-id <E1ls1AS-0004jf-7N at fasolo.debian.org>
and subject line Bug#988603: fixed in libxml2 2.9.4+dfsg1-7+deb10u2
has caused the Debian Bug report #988603,
regarding libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
988603: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988603
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms
Date: Sun, 16 May 2021 21:10:59 +0200
Size: 2720
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20210612/9e3a60d8/attachment.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Debian FTP Masters <ftpmaster at ftp-master.debian.org>
Subject: Bug#988603: fixed in libxml2 2.9.4+dfsg1-7+deb10u2
Date: Sat, 12 Jun 2021 10:47:08 +0000
Size: 5766
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20210612/9e3a60d8/attachment-0001.eml>


More information about the debian-xml-sgml-pkgs mailing list