I have now registered to the mailing list of xml,
Hopefully my question will not reach /dev/null this time,
Please read below:

From: Strasburger, Michal
Sent: Monday, March 9, 2020 3:49 PM
To: xml@gnome.org
Subject: Help in identification of security issues

Hi,

I am trying to identify the libxml2 versions that are vulnerable to 
CVE-2020-3846.
Whom shall I contact to confirm or decline if libxml-2.9.8 is vulnerable?
If vulnerable, is there any chance to point me to the code update which fixes 
this issue?
Or maybe there is any more generic way that libxml2 project references CVE's in 
code updates?

Any help would be greatly appreciated.

Have a nice day.

Michal

________________________________

This message is for the designated recipient only and may contain privileged, 
proprietary, or otherwise confidential information. If you have received it in 
error, please notify the sender immediately and delete the original. Any other 
use of the e-mail by you is prohibited. Where allowed by local law, electronic 
communications with Accenture and its affiliates, including e-mail and instant 
messaging (including content), may be scanned by our systems for the purposes 
of information security and assessment of internal compliance with Accenture 
policy. Your privacy is important to us. Accenture uses your personal data only 
in compliance with data protection laws. For further information on how 
Accenture processes your personal data, please see our privacy statement at 
https://www.accenture.com/us-en/privacy-policy.
______________________________________________________________________________________

www.accenture.com
_______________________________________________
xml mailing list, project page  http://xmlsoft.org/
xml@gnome.org
https://mail.gnome.org/mailman/listinfo/xml

Reply via email to