drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in roundcube
Name: |
Cross-Site Scripting in roundcube |
|
ID: |
DSA-4744-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Mi, 12. August 2020, 07:43 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16145 |
|
Applikationen: |
RoundCube Webmail |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4744-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 12, 2020 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : roundcube CVE ID : CVE-2020-16145 Debian Bug : 968216
It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to cross-site scripting vulnerabilities in handling invalid svg and math tag content.
For the stable distribution (buster), this problem has been fixed in version 1.3.15+dfsg.1-1~deb10u1.
We recommend that you upgrade your roundcube packages.
For the detailed security status of roundcube please refer to its security tracker page at: https://security-tracker.debian.org/tracker/roundcube
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl8zb3hfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SbixAAi/RB4RUdB2xzRZs+dd++ETE8o245xzVBcdYCaDCDRb2Nou3v0+pn1S8y Tj5GPV8Jwqnko7TcS7lb7O+dVfqJ3n3JKCZM6vE/v7X5BZBSJ9YYhyC+szO7tZL3 jDt0vcRFaElD94Y+dvUULwUHKjR5LQD1YSTGs0mbOU1zttsQ8jdHEAHFdS6HnlRZ dri5P9yOcxGCpC439qhm5wTRUqZ1VQcgI5Z/g6CoEFtyCv2fLOxbg6dZv/sXaTfc 8ahCpNRIaDpV6/Q0oDMhNvHK2ED9zm44oHrDqDfvRu8NTSDRBt4zmjj29LTiiBGM tbFBsbiHJurtmKYlsDf7M9/zoBFP7iec1r/ArfIVDDfGblp/FGgaBvWBa0qlr5cF GN8h4kUEFSv13YD6kBiKH43tcG7OMIME6EsipTd8KEa4j0HI6RJaqw94g3CjD962 8JtUqEwQ0/eAi7/6YzwVecwVblrHyup5s+404Cq03ay9YmaihZVcY/gJt7Ry51Xh GwYzf+dIGYBDpjn/KNHnbavW6qR3dSBu+DQsOeUox5sRU1My40J8D+v5WlhlVrnO z8yxI2i1D1zLWl2hzvV4mKdDH4jurKVbSjfu3xKhHstctlNPztm53TEmSn/rWmQS lG4WtccUiG/SxiZCeVjr83P7FqzfdZcFiLW/7ADcyaXZyNy3NS4= =urCb -----END PGP SIGNATURE-----
|
|
|
|