Processing control commands:

> tags 1022224 + patch
Bug #1022224 [src:libxml2] libxml2: CVE-2022-40303: Integer overflows with 
XML_PARSE_HUGE
Added tag(s) patch.
> tags 1022224 + pending
Bug #1022224 [src:libxml2] libxml2: CVE-2022-40303: Integer overflows with 
XML_PARSE_HUGE
Added tag(s) pending.
> tags 1022225 + patch
Bug #1022225 [src:libxml2] libxml2: CVE-2022-40304: dict corruption caused by 
entity reference cycles
Added tag(s) patch.
> tags 1022225 + pending
Bug #1022225 [src:libxml2] libxml2: CVE-2022-40304: dict corruption caused by 
entity reference cycles
Added tag(s) pending.

-- 
1022224: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022224
1022225: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022225
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to