|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2013-19745 (roundcubemail)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 18 Update: roundcubemail-0.9.5-1.fc18
Date:  Thu, 31 Oct 2013 02:59:02 +0000
Message-ID:  <20131031025902.AE21622DFC@bastion01.phx2.fedoraproject.org>
Archive‑link:  Article

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2013-19745 2013-10-23 02:08:12 -------------------------------------------------------------------------------- Name : roundcubemail Product : Fedora 18 Version : 0.9.5 Release : 1.fc18 URL : http://www.roundcube.net Summary : Round Cube Webmail is a browser-based multilingual IMAP client Description : RoundCube Webmail is a browser-based multilingual IMAP client with an application-like user interface. It provides full functionality you expect from an e-mail client, including MIME support, address book, folder manipulation, message searching and spell checking. RoundCube Webmail is written in PHP and requires a database: MySQL, PostgreSQL and SQLite are known to work. The user interface is fully skinnable using XHTML and CSS 2. -------------------------------------------------------------------------------- Update Information: Roundcubemail just released new 0.9.5 version with fixes for VCE2013-6172(will be available soon). Hotfix: https://github.com/roundcube/roundcubemail/commit/4109bb2... Full announcement: -------- We just published new releases which fix a recently reported vulnerability that allows an attacker to overwrite configuration settings using user preferences. This can result in random file access, manipulated SQL queries and even code execution. The latter one only affects versions 0.8.6 and older. Beside the security fix, the 0.9.5 release also includes other minor bug fixes and improvements. Most notably it brings the default spell checker back after Google suspended their public spell checking service. -------------------------------------------------------------------------------- ChangeLog: * Tue Oct 22 2013 Jon Ciesla <limburgher@gmail.com> - 0.9.5-1 - Fix for CVE-2013-6172, BZ 1021735, 1021965. * Mon Sep 9 2013 Jon Ciesla <limburgher@gmail.com> - 0.9.4-1 - 0.9.4 - Change httpd dep to webserver, BZ 1005696. * Fri Aug 23 2013 Adam Williamson <awilliam@redhat.com> - 0.9.3-2 - patch tinymce to cope elegantly with Flash binary being removed * Fri Aug 23 2013 Jon Ciesla <limburgher@gmail.com> - 0.9.3-1 - Fix two XSS vulnerabilities: - http://trac.roundcube.net/ticket/1489251 * Fri Aug 16 2013 Jon Ciesla <limburgher@gmail.com> - 0.9.2-3 - Drop precompiled flash. * Sun Aug 4 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Mon Jun 17 2013 Adam Williamson <awilliam@redhat.com> - 0.9.2-1 - latest upstream - correct License field, add comment on complex licensing case * Wed May 1 2013 Adam Williamson <awilliam@redhat.com> - 0.9.0-1 - latest upstream - drop MDB2 dependencies, add php-pdo dependency (upstream now using pdo not MDB2) - drop the update.sh script as it requires the installer framework we don't ship - update the Fedora README for changes to sqlite and update process - drop strict.patch, upstream actually merged it years ago, just in a slightly different format, and we kept dumbly diffing it - drop references to obsolete patches (all merged upstream long ago) * Thu Mar 28 2013 Jon Ciesla <limburgher@gmail.com> - 0.8.6-1 - Latest upstream, fixes local file inclusion via web UI - modification of certain config options. * Fri Feb 8 2013 Jon Ciesla <limburgher@gmail.com> - 0.8.5-1 - Latest upstream, CVE-2012-6121. * Mon Dec 3 2012 Remi Collet <remi@fedoraproject.org> - 0.8.4-2 - requires php-fileinfo instead of php-pecl-Fileinfo -------------------------------------------------------------------------------- References: [ 1 ] Bug #1021735 - CVE-2013-6172: Vulnerability in handling _session argument of utils/save-prefs [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1021735 [ 2 ] Bug #1021965 - CVE-2013-6172 roundcubemail: vulnerability in handling _session argument of utils/save-prefs [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1021965 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update roundcubemail' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds