Your message dated Mon, 29 Nov 2021 18:17:25 +0000
with message-id <[email protected]>
and subject line Bug#1000156: fixed in roundcube 1.3.17+dfsg.1-1~deb10u1
has caused the Debian Bug report #1000156,
regarding roundcube: XSS vulnerability in handling attachment filename 
extension in MIME type mismatch warnings
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1000156: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000156
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: roundcube
Severity: important
Tags: security
Control: found -1 1.3.16+dfsg.1-1~deb10u1
Control: found -1 1.4.11+dfsg.1-4
Control: fixed -1 1.5.0+dfsg.1-1

In a recent post roundcube webmail upstream has announced the
following security fixes:

 * Fix XSS issue in handling attachment filename extension in mimetype
   mismatch warning
 * Fix possible SQL injection via some session variables

sid/bookworm's 1.5.0+dfsg.1-2 is not affected.  Upstream fixes for LTS
branches:

    1.4.x 
https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a
          
https://github.com/roundcube/roundcubemail/commit/c8947ecb762d9e89c2091bda28d49002817263f1
    1.3.x 
https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7
          
https://github.com/roundcube/roundcubemail/commit/ee809bde2dcaa04857a919397808a7296681dcfa

-- 
Guilhem.

[0] 
https://roundcube.net/news/2021/11/12/security-updates-1.4.12-and-1.3.17-released

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: roundcube
Source-Version: 1.3.17+dfsg.1-1~deb10u1
Done: Guilhem Moulin <[email protected]>

We believe that the bug you reported is fixed in the latest version of
roundcube, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guilhem Moulin <[email protected]> (supplier of updated roundcube package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 18 Nov 2021 19:52:34 +0100
Source: roundcube
Architecture: source
Version: 1.3.17+dfsg.1-1~deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Roundcube Maintainers 
<[email protected]>
Changed-By: Guilhem Moulin <[email protected]>
Closes: 1000156
Changes:
 roundcube (1.3.17+dfsg.1-1~deb10u1) buster-security; urgency=high
 .
   * New bugfix/security upstream release (closes: #1000156), with fixes for:
     + CVE-2021-44025: XSS issue in handling attachment filename extension in
       mimetype mismatch warning; and
     + CVE-2021-44026: possible SQL injection via some session variables.
   * Refresh d/patches.
   * Refresh d/upstream/signing-key.asc.
   * d/gbp.conf: Rename upstream branch to upstream/release-1.3.
Checksums-Sha1:
 60dec2e7f716f676620b39092d0542ee6896c35c 2487 
roundcube_1.3.17+dfsg.1-1~deb10u1.dsc
 049b02152dc5e7a640fbc5e9ea59ac374c235298 2186304 
roundcube_1.3.17+dfsg.1.orig.tar.xz
 ed2717075cda99eb7383cd84d64e43fcf8c6bbb7 3054684 
roundcube_1.3.17+dfsg.1-1~deb10u1.debian.tar.xz
 a1d08aa29bd5515a5688297a00059b1e32504422 9339 
roundcube_1.3.17+dfsg.1-1~deb10u1_amd64.buildinfo
Checksums-Sha256:
 07d4b520e36900c5ac213da5f93aa44c81e7c02a340a0f2a0c940db33242be4b 2487 
roundcube_1.3.17+dfsg.1-1~deb10u1.dsc
 de5fa96b2e5fb9c6584e06c7dea6f959dcd5f24950cf22f2125f1da1450ef3cb 2186304 
roundcube_1.3.17+dfsg.1.orig.tar.xz
 f72cd55bc0e6f822350e5635d96d881764886b601c2857172ddea852d1306e92 3054684 
roundcube_1.3.17+dfsg.1-1~deb10u1.debian.tar.xz
 149a1612336afa7b5db1f0a5ca929e13376ce38f6b26edd9a6731ed762c11ded 9339 
roundcube_1.3.17+dfsg.1-1~deb10u1_amd64.buildinfo
Files:
 430dddff4b3c764ed7593f2fc8833a81 2487 web optional 
roundcube_1.3.17+dfsg.1-1~deb10u1.dsc
 d6e1afb06f95297460a0cecc43c5ec17 2186304 web optional 
roundcube_1.3.17+dfsg.1.orig.tar.xz
 1f087b1bf713c6a294ecefc415573da8 3054684 web optional 
roundcube_1.3.17+dfsg.1-1~deb10u1.debian.tar.xz
 2981ccd2e0122d64ae97b5e463af43c3 9339 web optional 
roundcube_1.3.17+dfsg.1-1~deb10u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=POFN
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to