Sicherheit: Cross-Site Scripting in roundcubemail
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in roundcubemail
ID: FEDORA-2020-b1e023936e
Distribution: Fedora
Plattformen: Fedora 31
Datum: Do, 20. August 2020, 07:41
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16145
Applikationen: RoundCube Webmail


Fedora Update Notification
2020-08-20 01:03:35.305851

Name : roundcubemail
Product : Fedora 31
Version : 1.4.8
Release : 1.fc31
URL : http://www.roundcube.net
Summary : Round Cube Webmail is a browser-based multilingual IMAP client
Description :
RoundCube Webmail is a browser-based multilingual IMAP client
with an application-like user interface. It provides full
functionality you expect from an e-mail client, including MIME
support, address book, folder manipulation, message searching
and spell checking. RoundCube Webmail is written in PHP and
requires a database: MySQL, PostgreSQL and SQLite are known to
work. The user interface is fully skinnable using XHTML and
CSS 2.

Update Information:

**RELEASE 1.4.8** - **Security**: Fix potential XSS issue in HTML editor of
the identity signature input (#7507) - Managesieve: Fix too-small input field
Elastic when using custom headers (#7498) - Fix support for an error as a
in message_before_send hook (#7475) - Elastic: Fix redundant scrollbar in plain
text editor on mail reply (#7500) - Elastic: Fix deleted and replied+forwarded
icons on messages list (#7503) - Managesieve: Allow angle brackets in out-of-
office message body (#7518) - Fix bug in conversion of email addresses to
links in plain text messages (#7526) - Fix format=flowed formatting on plain
text part derived from the HTML content (#7504) - Fix incorrect rewriting of
internal links in HTML content (#7512) - Fix handling links without defined
protocol (#7454) - Fix paging of search results on IMAP servers with no SORT
capability (#7462) - Fix detecting special folders on servers with both
USE and LIST-STATUS (#7525) - **Security**: Fix cross-site scripting (XSS) via
HTML messages with malicious svg content [CVE-2020-16145] - **Security**: Fix
cross-site scripting (XSS) via HTML messages with malicious math content

* Tue Aug 11 2020 Remi Collet <remi@remirepo.net> - 1.4.8-1
- update to 1.4.8

[ 1 ] Bug #1868344 - CVE-2020-16145 roundcubemail: xss via HTML messages with
malicious svg content

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-b1e023936e' at the command
line. For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux @Facebook
Neue Nachrichten