Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in roundcubemail
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in roundcubemail
ID: FEDORA-2015-1772
Distribution: Fedora
Plattformen: Fedora 21
Datum: So, 15. Februar 2015, 11:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1433

Originalnachricht

Name        : roundcubemail
Product : Fedora 21
Version : 1.0.5
Release : 1.fc21
URL : http://www.roundcube.net
Summary : Round Cube Webmail is a browser-based multilingual IMAP client
Description :
RoundCube Webmail is a browser-based multilingual IMAP client
with an application-like user interface. It provides full
functionality you expect from an e-mail client, including MIME
support, address book, folder manipulation, message searching
and spell checking. RoundCube Webmail is written in PHP and
requires a database: MySQL, PostgreSQL and SQLite are known to
work. The user interface is fully skinnable using XHTML and
CSS 2.

-------------------------------------------------------------------------------
-
Update Information:

Cross-site scripting vulnerability has been fixed in Roundcube 1.0.5 version.

http://roundcube.net/news/2015/01/24/security-update-1.0.5/
http://trac.roundcube.net/wiki/Changelog#RELEASE1.0.5
http://trac.roundcube.net/ticket/1490227

CVE request: http://www.openwall.com/lists/oss-security/2015/01/31/3
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Feb 5 2015 Jon Ciesla <limburgher@gmail.com> - 1.0.5-1
- Fix for security issues.
* Sat Dec 20 2014 Adam Williamson <awilliam@redhat.com> - 1.0.4-2
- drop tinymce bbcode plugin for safety (CVE-2012-4230)
* Sat Dec 20 2014 Adam Williamson <awilliam@redhat.com> - 1.0.4-1
- new release 1.0.4 (security update)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1188203 - CVE-2015-1433 roundcubemail: crooss-site scripting in
style attribute handling [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1188203
[ 2 ] Bug #1188202 - CVE-2015-1433 roundcubemail: crooss-site scripting in
style attribute handling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1188202
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update roundcubemail' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung