openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2023:0345-1
Rating:             important
References:         #1216429 
Cross-References:   CVE-2023-5631
CVSS scores:
                    CVE-2023-5631 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
                    CVE-2023-5631 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Affected Products:
                    openSUSE Backports SLE-15-SP5
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for roundcubemail fixes the following issues:

   Update to version 1.6.4 (boo#1216429):

   * CVE-2023-5631: Fix cross-site scripting vulnerability in handling of SVG
     in HTML messages
   * Fix PHP8 warnings
   * Fix default 'mime.types' path on Windows
   * Managesieve: Fix javascript error when relational or spamtest extension
     is not enabled


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP5:

      zypper in -t patch openSUSE-2023-345=1



Package List:

   - openSUSE Backports SLE-15-SP5 (noarch):

      roundcubemail-1.6.4-bp155.2.6.1


References:

   https://www.suse.com/security/cve/CVE-2023-5631.html
   https://bugzilla.suse.com/1216429

openSUSE: 2023:0345-1 important: roundcubemail

November 2, 2023
An update that fixes one vulnerability is now available

Description

This update for roundcubemail fixes the following issues: Update to version 1.6.4 (boo#1216429): * CVE-2023-5631: Fix cross-site scripting vulnerability in handling of SVG in HTML messages * Fix PHP8 warnings * Fix default 'mime.types' path on Windows * Managesieve: Fix javascript error when relational or spamtest extension is not enabled

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2023-345=1


Package List

- openSUSE Backports SLE-15-SP5 (noarch): roundcubemail-1.6.4-bp155.2.6.1


References

https://www.suse.com/security/cve/CVE-2023-5631.html https://bugzilla.suse.com/1216429


Severity
Announcement ID: openSUSE-SU-2023:0345-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP5 .

Related News