Package: kdepimlibs
Version: 4:4.4.5-2
Severity: grave
Tags: security patch upstream
Justification: user security hole
KDE Project Security Advisory
=
Title: KMail: HTML injection in plain text viewer
Risk Rating:Important
CVE:CVE-2016-7966
Pla
Source: libxml2
Version: 2.9.4+dfsg1-2
Severity: grave
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for libxml2.
CVE-2016-4658[0]:
| libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and
| watchOS before 3 allows remote attackers to
Source: libxml2
Version: 2.9.4+dfsg1-2
Severity: grave
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for libxml2.
CVE-2016-5131[0]:
| Use-after-free vulnerability in libxml2 through 2.9.4, as used in
| Google Chrome before 52.0.2743.82, allows remote
Source: guile-2.0
Version: 2.0.11+1-9
Severity: important
Tags: security upstream patch
Forwarded: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=24659
Hi,
the following vulnerability was published for guile-2.0.
CVE-2016-8605[0]:
Thread-unsafe umask modification
If you fix the vulnerability plea
Source: guile-2.0
Version: 2.0.11+1-9
Severity: important
Tags: security upstream patch
Hi,
the following vulnerability was published for guile-2.0.
CVE-2016-8606[0]:
REPL server vulnerable to HTTP inter-protocol attacks
If you fix the vulnerability please also make sure to include the
CVE (Com
5 matches
Mail list logo