You are here
Home > Preporuke > Ranjivost programskog paketa roundcubemail

Ranjivost programskog paketa roundcubemail

  • Detalji os-a: LSU
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:0210-1
Rating: important
References: #962067
Cross-References: CVE-2015-8770
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update to roundcubemail 1.0.8 fixes the following issues:

– CVE-2015-8770: Path traversal vulnerability allowed code execution to
remote authenticated users if they were also upload files to the same
server through some other method (boo#962067)

This update also contains all upstream fixes in 1.0.8. The package was
updated to use generic PHP requirements for use with other prefixes than
“php5-“

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.2:

zypper in -t patch openSUSE-2016-81=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.2 (noarch):

roundcubemail-1.0.8-17.1

References:

https://www.suse.com/security/cve/CVE-2015-8770.html
https://bugzilla.suse.com/962067


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:0213-1
Rating: important
References: #962067
Cross-References: CVE-2015-8770
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update to roundcubemail 1.1.4 fixes the following issues:

– CVE-2015-8770: Path traversal vulnerability allowed code execution to
remote authenticated users if they were also upload files to the same
server through some other method (boo#962067)

This update also contains all upstream fixes in 1.1.4. The package was
updated to use generic PHP requirements for use with other prefixes than
“php5-“

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-80=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.1 (noarch):

roundcubemail-1.1.4-6.1

References:

https://www.suse.com/security/cve/CVE-2015-8770.html
https://bugzilla.suse.com/962067


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:0214-1
Rating: important
References: #962067
Cross-References: CVE-2015-8770
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

Update to 1.0.8
– Add workaround for https://bugs.php.net/bug.php?id=70757 (#1490582)
– Fix HTML sanitizer to skip <!– node type X –> in output
(#1490583)
– Fix charset encoding of message/rfc822 part bodies (#1490606)
– Fix handling of message/rfc822 attachments on replies and forwards
(#1490607)
– Fix PDF support detection in Firefox > 19 (#1490610)
– Fix path traversal vulnerability (CWE-22) in setting a skin (#1490620)
[CVE-2015-8770] [bnc#962067]
– Fix so drag-n-drop of text (e.g. recipient addresses) on compose page
actually works (#1490619)
– Fix .htaccess rewrite rules to not block .well-known URIs (#1490615)
– Updated apache2 config

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.1:

zypper in -t patch 2016-84=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.1 (noarch):

roundcubemail-1.0.8-2.27.1

References:

https://www.suse.com/security/cve/CVE-2015-8770.html
https://bugzilla.suse.com/962067


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorTomislav Protega
Cert idNCERT-REF-2016-01-0003-ADV
CveCVE-2015-8770
ID izvornikaopenSUSE-SU-2016:0210-1 openSUSE-SU-2016:0213-1 openSUSE-SU-2016:0214-1
ProizvodSecurity update for roundcubemail
Izvorhttp://www.suse.com
Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak u radu jezgre operacijskog sustava SUSE LE. Nedostatak je uzrokovan neispravnom implementacijom "session keyring" komponente. Potencijalnim...

Close