openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2016:3309-1
Rating:             important
References:         #1001856 #1012493 #982003 
Cross-References:   CVE-2016-5103
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________
   An update that solves one vulnerability and has two fixes
   is now available.
Description:
This update for roundcubemail fixes the following issues:
      – A maliciously crafted email could cause untrusted code to be executed
        (cross site scripting using $lt;area href=javascript:…>)
        (boo#982003, CVE-2016-5103)
      – Avoid HTML styles that could cause potential click jacking
        (boo#1001856)
      – A maliciously crafted FROM value could cause extra parameters to be
        passed to the sendmail command (boo#1012493)
      – Avoid sending completely empty text parts for multipart/alternative
        messages
      – Don’t create multipart/alternative messages with empty text/plain part
      – Improved validation of FROM argument when sending mails
Patch Instructions:
   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
– openSUSE 13.1:
zypper in -t patch 2016-1533=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.1 (noarch):
roundcubemail-1.0.9-2.36.1
References:
   https://www.suse.com/security/cve/CVE-2016-5103.html
   https://bugzilla.suse.com/1001856
   https://bugzilla.suse.com/1012493
   https://bugzilla.suse.com/982003
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



