lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1gQetI-0002vY-4k@seger.debian.org>
Date: Sat, 24 Nov 2018 20:51:00 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4344-1] roundcube security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4344-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 24, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : roundcube
CVE ID         : CVE-2018-19206

Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, is prone to a cross-site scripting
vulnerability in handling invalid style tag content.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.3+dfsg.1-4+deb9u3.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=qFzO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ