Package: nltk X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerability was published for nltk. CVE-2021-3828[0]: | nltk is vulnerable to Inefficient Regular Expression Complexity If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-3828 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3828 Please adjust the affected versions in the BTS as needed. Fixed upstream: https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6 https://github.com/nltk/nltk/pull/2816 Current vulnerable version in unstable: https://sources.debian.org/src/nltk/3.5-1/nltk/corpus/reader/comparative_sents.py/#L48 -- Neil Williams ============= https://linux.codehelp.co.uk/
pgppmirgJNDpQ.pgp
Description: OpenPGP digital signature