I seem to have attached the wrong set of patches to this bug earlier.
Here are the correct ones. Upstream bug already has the correct set of
patches.
--
Sunil
From 0a325e7847daf150885911706926b7b8f5d7a66e Mon Sep 17 00:00:00 2001
From: Sunil Mohan Adapa
Date: Wed, 17 Jun 2020 14:07:30 -0700
Subj
tag 851771 + patch
thanks
Hello,
TT-RSS is an important application for FreedomBox and it continues to
use php-gettext library. TT-RSS is currently not available for testing.
It would be nice to have it back.
To address this, I have implemented a parser for the plurals expressions
instead of usi
Hi,
On Wed, Jan 18, 2017 at 05:23:43PM +0100, Salvatore Bonaccorso wrote:
> the following vulnerability was published for php-gettext.
>
> CVE-2016-6175[0]:
> Use of eval too unrestrictive
The packages using php-gettext in buster are:
cacti: cacti
kopano-webapp: kopano-webapp-common
phpmyadmin
Source: php-gettext
Version: 1.0.11-1
Severity: grave
Tags: security upstream
Forwarded: https://bugs.launchpad.net/php-gettext/+bug/1606184
Hi,
the following vulnerability was published for php-gettext.
CVE-2016-6175[0]:
Use of eval too unrestrictive
If you fix the vulnerability please also m
4 matches
Mail list logo