[xml/sgml-pkgs] Bug#988603: marked as done (libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms)
Debian Bug Tracking System
owner at bugs.debian.org
Sat May 22 07:51:05 BST 2021
Your message dated Sat, 22 May 2021 06:48:27 +0000
with message-id <E1lkLQx-0005Z7-DM at fasolo.debian.org>
and subject line Bug#988603: fixed in libxml2 2.9.10+dfsg-6.7
has caused the Debian Bug report #988603,
regarding libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)
--
988603: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988603
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: libxml2: CVE-2021-3541: Exponential entity expansion attack bypasses all existing protection mechanisms
Date: Sun, 16 May 2021 21:10:59 +0200
Size: 2720
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20210522/dd120da2/attachment-0002.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Debian FTP Masters <ftpmaster at ftp-master.debian.org>
Subject: Bug#988603: fixed in libxml2 2.9.10+dfsg-6.7
Date: Sat, 22 May 2021 06:48:27 +0000
Size: 5195
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20210522/dd120da2/attachment-0003.eml>
More information about the debian-xml-sgml-pkgs
mailing list