Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in RoundCube Webmail
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in RoundCube Webmail
ID: openSUSE-SU-2016:0213-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.1
Datum: So, 24. Januar 2016, 20:05
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770
Applikationen: RoundCube Webmail

Originalnachricht

   openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:0213-1
Rating: important
References: #962067
Cross-References: CVE-2015-8770
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


This update to roundcubemail 1.1.4 fixes the following issues:

- CVE-2015-8770: Path traversal vulnerability allowed code execution to
remote authenticated users if they were also upload files to the same
server through some other method (boo#962067)

This update also contains all upstream fixes in 1.1.4. The package was
updated to use generic PHP requirements for use with other prefixes than
"php5-"


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-80=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.1 (noarch):

roundcubemail-1.1.4-6.1


References:

https://www.suse.com/security/cve/CVE-2015-8770.html
https://bugzilla.suse.com/962067

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung