Public bug reported: Straight from the Debian bug:
the following vulnerability was published for php-gettext. CVE-2016-6175[0]: Use of eval too unrestrictive If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-6175 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6175 [1] https://bugs.launchpad.net/php-gettext/+bug/1606184 Please remove php-getttext from the archive ** Affects: nagvis (Ubuntu) Importance: Undecided Status: New ** Affects: php-gettext (Ubuntu) Importance: Undecided Status: New ** Affects: tt-rss (Ubuntu) Importance: Undecided Status: New ** Affects: php-gettext (Debian) Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863891 Title: php-gettext: CVE-2016-6175 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nagvis/+bug/1863891/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs