Your message dated Wed, 14 Aug 2024 20:36:17 +0000 with message-id <e1sekjb-00fmtw...@fasolo.debian.org> and subject line Bug#1077969: fixed in roundcube 1.4.15+dfsg.1-1+deb11u4 has caused the Debian Bug report #1077969, regarding roundcube: CVE-2024-42008, CVE-2024-42009, CVE-2024-42010: XSS and information leak vulnerabilities to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1077969: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077969 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: roundcube Version: 1.6.7+dfsg-1 Severity: important Found: -1 1.4.15+dfsg.1-1+deb11u3 Found: -1 1.6.5+dfsg-1+deb12u2 Tags: upstream security Roundcube webmail upstream has recently released 1.6.8 [0] which fixes the following vulnerabilities: * CVE-2024-42008: XSS vulnerability in serving of attachments other than HTML or SVG https://github.com/roundcube/roundcubemail/commit/89c8fe9ae9318c015807fbcbf7e39555fb30885d * CVE-2024-42009: XSS vulnerability in post-processing of sanitized HTML content https://github.com/roundcube/roundcubemail/commit/68af7c864a36e1941764238dac440ab0d99a8d26 * CVE-2024-42010: information leak (access to remote content) via insufficient CSS filtering https://github.com/roundcube/roundcubemail/commit/602d0f566eb39b6dcb739ad78323ec434a3b92ce -- Guilhem. [0] https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: roundcube Source-Version: 1.4.15+dfsg.1-1+deb11u4 Done: Guilhem Moulin <guil...@debian.org> We believe that the bug you reported is fixed in the latest version of roundcube, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1077...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Guilhem Moulin <guil...@debian.org> (supplier of updated roundcube package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 08 Aug 2024 23:48:56 +0200 Source: roundcube Architecture: source Version: 1.4.15+dfsg.1-1+deb11u4 Distribution: bullseye-security Urgency: high Maintainer: Debian Roundcube Maintainers <pkg-roundcube-maintain...@alioth-lists.debian.net> Changed-By: Guilhem Moulin <guil...@debian.org> Closes: 1077969 Changes: roundcube (1.4.15+dfsg.1-1+deb11u4) bullseye-security; urgency=high . * Fix CVE-2024-42008: Cross-site scripting (XSS) vulnerability in serving of attachments other than HTML or SVG. * Fix CVE-2024-42009: Cross-site scripting (XSS) vulnerability in post-processing of sanitized HTML content. (Closes: #1077969) * Fix CVE-2024-42010: Information leak (access to remote content) via insufficient CSS filtering. * Backport upstream fix for infinite loop when parsing malformed Sieve script. Checksums-Sha1: b1c02113680293fd3574e9271687a8aa5e881e13 3276 roundcube_1.4.15+dfsg.1-1+deb11u4.dsc 85e881df2b3d93da3081c588eeeb752880ce8da4 109876 roundcube_1.4.15+dfsg.1-1+deb11u4.debian.tar.xz d37902dc53bd9b9c0dc1c335e5a29c7d68818b54 10857 roundcube_1.4.15+dfsg.1-1+deb11u4_amd64.buildinfo Checksums-Sha256: 9ad8f09e42c6cbfa0cc8dc3b4338c4a70b85fa7a35a19801c12e490ff0c8f6a8 3276 roundcube_1.4.15+dfsg.1-1+deb11u4.dsc eeca2d679fe36aa08ff9099dcc33cb2ccf1ce2f2880f8f351ed5697a71fabeb6 109876 roundcube_1.4.15+dfsg.1-1+deb11u4.debian.tar.xz d57903b078e666179fc5452f23f1b117ae9ad0d14456a43beec462455165eb49 10857 roundcube_1.4.15+dfsg.1-1+deb11u4_amd64.buildinfo Files: c679031b681d45f6439cc8f054f07127 3276 web optional roundcube_1.4.15+dfsg.1-1+deb11u4.dsc 68c1d74d0406df79b80c4207f961bd98 109876 web optional roundcube_1.4.15+dfsg.1-1+deb11u4.debian.tar.xz cfa7811aca3fef6d28589048ff7369c6 10857 web optional roundcube_1.4.15+dfsg.1-1+deb11u4_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEERpy6p3b9sfzUdbME05pJnDwhpVIFAma33QsACgkQ05pJnDwh pVJGYQ/8CmLFYito5UrsYR/E0oAxfIfvr/zFD/HWaWa5DpYOGwmUfEr42bXQJ9aB QOPZhJIpyvESU2tbec0dlUdxB6MlVXge1Oe/JWAD/nMCwarVzWvwAyuRimoV8BLX sBgK0LT8ETxZKywTEgDIf/GLRM1O/yD85p8CLypHzhq26lgMI96tw5QJP1MGNeEq KTAMI+WqKlbKkdXKq6n/QRVK2jkzhmIUr4fVkgTUz4vXltdjbl2heh4kyyFZFtZv Bs7VaHMVnFBH4abjPphiNkqPIwvITvvedyEWGIIkM+jIh166NDz8aYc2doNERNbO 2mR/E+P1e0D+vF134zc/XCnLVZhhQqopTpjCCPNvCHLaEVl2WGUYvaoLNDGqXZUd 5UcsIZHmq945EFsKx9CFP/0iN2utDw6QDK+GG0XeVptxDByfJr6WNAca9e9p92am b6vcFTR5OgxU0BmDGYwy0ZWfpFzGkjIvOP25gUEZ83ltauT3PvEUNxAE4NPP+YO9 fmFbc66wxhESiPpz6JzjXl8jcfhA8Wu+D3cotX5FZujER4QkNZ4FAgR2Xw3fCDET yyQoJtSQJA1sl7DFS3PATlgF3HSsosbZ+BLVlgzDC0fa/z3E3+uhey2Ky3+ZsbYq +WmhbJjoOOuMBQS1w6b7lXAHE8YIQolT6tARfZvF945xN4yv7Lo= =0fNh -----END PGP SIGNATURE-----
pgpFr5hzzEWtD.pgp
Description: PGP signature
--- End Message ---