Processing control commands:

> tags 1022224 + patch
Bug #1022224 [src:libxml2] libxml2: CVE-2022-40303: Integer overflows with 
XML_PARSE_HUGE
Ignoring request to alter tags of bug #1022224 to the same tags previously set
> tags 1022224 + pending
Bug #1022224 [src:libxml2] libxml2: CVE-2022-40303: Integer overflows with 
XML_PARSE_HUGE
Ignoring request to alter tags of bug #1022224 to the same tags previously set
> tags 1022225 + patch
Bug #1022225 [src:libxml2] libxml2: CVE-2022-40304: dict corruption caused by 
entity reference cycles
Ignoring request to alter tags of bug #1022225 to the same tags previously set
> tags 1022225 + pending
Bug #1022225 [src:libxml2] libxml2: CVE-2022-40304: dict corruption caused by 
entity reference cycles
Ignoring request to alter tags of bug #1022225 to the same tags previously set

-- 
1022224: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022224
1022225: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022225
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to