[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5013-1] roundcube security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5013-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
November 27, 2021                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : roundcube
CVE ID         : CVE-2021-44025 CVE-2021-44026
Debian Bug     : 1000156

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly sanitize requests and mail
messages. This would allow an attacker to perform Cross-Side Scripting
(XSS) or SQL injection attacks.

For the oldstable distribution (buster), these problems have been fixed
in version 1.3.17+dfsg.1-1~deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 1.4.12+dfsg.1-1~deb11u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmGh/gYACgkQEL6Jg/PV
nWSv2gf9FLo2Qe4coRsW42ZmZXKnzpxKUpZC1TwFe758FhUl/2906yP1f4rKi5Ut
XE87aetT292vsM+STtlw87ZFbD1yQn2b4RfBF12+G84Qln5KGBlmjtfniU1vWafw
YrN8ZoSG879IY35oxQcLZcBMZanhjNsqVAuJiGPg8cKi0Un17shn8znf4u4D2hD6
7WyVEnYhBP2xXjA+U+FVGh+SiTDrd482iSl4gq/cJH4ig11L/qaWdCW0BPZT/Ppc
0FrZxW2R4W+54R6WFbA1qftQfMHNACi9XUlJTIwOi/7VfD1eM7dE+zw0lSB5JOMv
oNs9n1iAGWIBCB1Zf1kXOXbvyf5XXg==
=5tqH
-----END PGP SIGNATURE-----


Reply to: