Debian Bug report logs -
#1054079
roundcube: CVE-2023-5631: cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages
Reported by: Guilhem Moulin <guilhem@debian.org>
Date: Mon, 16 Oct 2023 18:27:01 UTC
Severity: important
Tags: security, upstream
Found in versions roundcube/1.6.3+dfsg-1~deb12u1, roundcube/1.4.14+dfsg.1-1~deb11u1, roundcube/1.6.3+dfsg-2, roundcube/1.3.17+dfsg.1-1~deb10u3
Fixed in versions roundcube/1.6.4+dfsg-1, roundcube/1.6.4+dfsg-1~deb12u1, roundcube/1.4.15+dfsg.1-1~deb11u1
Done: Guilhem Moulin <guilhem@debian.org>
Bug is archived. No further changes may be made.
Forwarded to https://github.com/roundcube/roundcubemail/issues/9168
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-lists.debian.net>:
Bug#1054079; Package src:roundcube.
(Mon, 16 Oct 2023 18:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Guilhem Moulin <guilhem@debian.org>:
New Bug report received and forwarded. Copy sent to Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-lists.debian.net>.
(Mon, 16 Oct 2023 18:27:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Source: roundcube
Version: 1.6.3+dfsg-2
Severity: important
Tags: security upstream
Control: found -1 1.3.17+dfsg.1-1~deb10u3
Control: found -1 1.4.14+dfsg.1-1~deb11u1
Control: found -1 1.6.3+dfsg-1~deb12u1
Control: forwarded -1 https://github.com/roundcube/roundcubemail/issues/9168
In a recent post roundcube webmail upstream has announced the
following security fix:
* Fix cross-site scripting (XSS) vulnerability in handling of SVG in
HTML messages.
AFAICT no CVE ID has been assigned or requested yet, so I'll file a
request to that effect. Upstream fixes for stable and LTS branches:
1.6.x https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
1.4.x https://github.com/roundcube/roundcubemail/commit/7b2df52ede57bab9e87e9c3bc00601eeca591a5e
https://github.com/roundcube/roundcubemail/commit/dc7b6850c68870570b438d79c0949a5031522127
1.3.x is no longer supported upstream but AFAICT affected nonetheless.
--
Guilhem.
[signature.asc (application/pgp-signature, inline)]
Marked as found in versions roundcube/1.3.17+dfsg.1-1~deb10u3.
Request was from Guilhem Moulin <guilhem@debian.org>
to submit@bugs.debian.org.
(Mon, 16 Oct 2023 18:27:04 GMT) (full text, mbox, link).
Marked as found in versions roundcube/1.4.14+dfsg.1-1~deb11u1.
Request was from Guilhem Moulin <guilhem@debian.org>
to submit@bugs.debian.org.
(Mon, 16 Oct 2023 18:27:04 GMT) (full text, mbox, link).
Marked as found in versions roundcube/1.6.3+dfsg-1~deb12u1.
Request was from Guilhem Moulin <guilhem@debian.org>
to submit@bugs.debian.org.
(Mon, 16 Oct 2023 18:27:05 GMT) (full text, mbox, link).
Reply sent
to Guilhem Moulin <guilhem@debian.org>:
You have taken responsibility.
(Mon, 16 Oct 2023 19:09:05 GMT) (full text, mbox, link).
Notification sent
to Guilhem Moulin <guilhem@debian.org>:
Bug acknowledged by developer.
(Mon, 16 Oct 2023 19:09:05 GMT) (full text, mbox, link).
Message #18 received at 1054079-close@bugs.debian.org (full text, mbox, reply):
Source: roundcube
Source-Version: 1.6.4+dfsg-1
Done: Guilhem Moulin <guilhem@debian.org>
We believe that the bug you reported is fixed in the latest version of
roundcube, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1054079@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Guilhem Moulin <guilhem@debian.org> (supplier of updated roundcube package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 16 Oct 2023 20:02:40 +0200
Source: roundcube
Architecture: source
Version: 1.6.4+dfsg-1
Distribution: unstable
Urgency: high
Maintainer: Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-lists.debian.net>
Changed-By: Guilhem Moulin <guilhem@debian.org>
Closes: 1053709 1054079
Changes:
roundcube (1.6.4+dfsg-1) unstable; urgency=high
.
* New upstream security and bugfix release:
+ Fix cross-site scripting (XSS) vulnerability in handling of SVG in HTML
messages. (Closes: #1054079)
+ Managesieve plugin: Fix javascript error when relational or spamtest
extension is not enabled.
+ Fix PHP8 warnings.
* Add DEP-8 test to check RCMAIL_VERSION against d/changelog.
* roundcube-core.postinst: Don't choke on non-existing symlink targets.
(Closes: #1053709)
Checksums-Sha1:
f510193b40bddf74f487677dbaa0fd1557c09fdc 3801 roundcube_1.6.4+dfsg-1.dsc
49a41f382aaf74673bd5dc649d3cbe8d67ace5ca 220736 roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
32758ee3f2b186460c2e8f1cd87aa8ee22c6bc44 1858152 roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
6b100df31c0cb2d0e296386c871a59bde179846b 2784448 roundcube_1.6.4+dfsg.orig.tar.xz
510673f4a01b6edc45d3e7dae342ffea558400d5 105368 roundcube_1.6.4+dfsg-1.debian.tar.xz
c5d075dae6d4be1e5ad40d182ea3c28d8b9e5773 13600 roundcube_1.6.4+dfsg-1_amd64.buildinfo
Checksums-Sha256:
cf926617fd976cd63eec4ade40bc077cd0276a9f66dc614e4471e69390f47b2d 3801 roundcube_1.6.4+dfsg-1.dsc
3d7bf2bba2010c171319a76a266b671e01d5c7bff3e200fe9d966bf915932dbe 220736 roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
d347dcebc705fd65214c08cdb02367e39bef9e3eba41c0affe84bc42ccec8aa9 1858152 roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
ea4e8fb414edd0961aa69d4ffba03d4981a4fad62580d88989f71489d11f3a1e 2784448 roundcube_1.6.4+dfsg.orig.tar.xz
27addc955d2b1d5760f54a91b83805b525a81eaf2f89a1afbaa14fcaf4aee2ea 105368 roundcube_1.6.4+dfsg-1.debian.tar.xz
e1880481d8452a2072271dbfb14ae930759fc720c8dd6a37a35bd2d153591717 13600 roundcube_1.6.4+dfsg-1_amd64.buildinfo
Files:
f51e5fdfeacc018f61324026a90a8023 3801 web optional roundcube_1.6.4+dfsg-1.dsc
b8e238bb13d3f2c9e3052bf77ab32dde 220736 web optional roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
e5a66bf48031beb980234a0d27d77fdf 1858152 web optional roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
36dc8f64d4e01669457ca1ac400ffaa3 2784448 web optional roundcube_1.6.4+dfsg.orig.tar.xz
8acc4c83b9e2795ab7e7970b47b43ca0 105368 web optional roundcube_1.6.4+dfsg-1.debian.tar.xz
8cb9541c5feb8c0a00b3640f8f9b1d9d 13600 web optional roundcube_1.6.4+dfsg-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEERpy6p3b9sfzUdbME05pJnDwhpVIFAmUtgW0ACgkQ05pJnDwh
pVL3ag//RclksWDRkF9dukva9YAKnc/Xnyt2QWx8BGOmuQj77103lafWIvNTgYKl
SR/eouLhAIpKjDdS0UVM5z3m2CvHGvOi2FKKSaJfgZtPTkeKnk0YHRIa7wRZUVJU
qTO6qNnFgJ+lsuINbJcHp1xCxZel11FBygaTYdy0LSnDK8p/5SiWzCTLrtvaQmrF
wZ8557cy2adCqTlNjuujtrX9GyUEwFkAmo/H9dYEq19SNpVlSfTTO2tsET9jxhJY
/VoeNLlkLphrf2cmO569iaCHbnBAuSMfZrBnWgKwGQXVjgdwAugdUNQoR49ty8II
k84nhQMQH2g7+geDqV2/uL3k7dDGhRZDyABuzgWK6PxMieS2gZ2pDDZdBT9yHXyb
KiWEixyEm6JvBTA3spcVInq5qDFwFmJThBjVXAhpclK2vIGhR8HpxXMr7NaqRKnq
OOrL5/gCF5madijCcV/2tzciPMQOugG6r+kPhbB7l+DplYiyacWStNMjLhtzCVWW
Uyp7yZELbYbLlLhrdYq8voxC8S/biA16730g+eJuDjoSZ7b0510+TLNPZli3x1fV
ZF0ZdvP8WBIV7KC6/SP76sdBpygLd82vdyed6rQPsVAJ/h7BICDOztScIIgzy6FZ
tBHFt1d9qHOGZHWRgTn9eVMJMNyYMki+MVwQnxqobw4a2Rd/wKM=
=c24g
-----END PGP SIGNATURE-----
Changed Bug title to 'roundcube: CVE-2023-5631: cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages' from 'roundcube: cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages'.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Wed, 18 Oct 2023 20:27:02 GMT) (full text, mbox, link).
Reply sent
to Guilhem Moulin <guilhem@debian.org>:
You have taken responsibility.
(Sat, 28 Oct 2023 20:36:19 GMT) (full text, mbox, link).
Notification sent
to Guilhem Moulin <guilhem@debian.org>:
Bug acknowledged by developer.
(Sat, 28 Oct 2023 20:36:19 GMT) (full text, mbox, link).
Message #25 received at 1054079-close@bugs.debian.org (full text, mbox, reply):
Source: roundcube
Source-Version: 1.6.4+dfsg-1~deb12u1
Done: Guilhem Moulin <guilhem@debian.org>
We believe that the bug you reported is fixed in the latest version of
roundcube, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1054079@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Guilhem Moulin <guilhem@debian.org> (supplier of updated roundcube package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 19 Oct 2023 00:20:52 +0200
Source: roundcube
Architecture: source
Version: 1.6.4+dfsg-1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-lists.debian.net>
Changed-By: Guilhem Moulin <guilhem@debian.org>
Closes: 1054079
Changes:
roundcube (1.6.4+dfsg-1~deb12u1) bookworm-security; urgency=high
.
* New upstream security and bugfix release:
+ Fix CVE-2023-5631: Cross-site scripting (XSS) vulnerability in handling
of SVG in HTML messages. (Closes: #1054079)
+ Managesieve plugin: Fix javascript error when relational or spamtest
extension is not enabled.
+ Fix PHP8 warnings.
* Replace upstream release “version” 1.6-git with the actual tagged version.
* Add DEP-8 test to check RCMAIL_VERSION against d/changelog.
* Salsa CI: Disable lintian and reprotest jobs.
* Refresh patches.
Checksums-Sha1:
305df9757a89e3e7a2b10e51418a78edbcb0fe85 3833 roundcube_1.6.4+dfsg-1~deb12u1.dsc
49a41f382aaf74673bd5dc649d3cbe8d67ace5ca 220736 roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
32758ee3f2b186460c2e8f1cd87aa8ee22c6bc44 1858152 roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
6b100df31c0cb2d0e296386c871a59bde179846b 2784448 roundcube_1.6.4+dfsg.orig.tar.xz
e1acd2861d40e9758fcd9c6759cefb28b5704168 105428 roundcube_1.6.4+dfsg-1~deb12u1.debian.tar.xz
c69103d07eb570f2933e240a07bec73c25f71ee9 13981 roundcube_1.6.4+dfsg-1~deb12u1_amd64.buildinfo
Checksums-Sha256:
3915499bbdfa1cb11080b907a5ae8280404f17c5c0ce68711c0e7c7178f7a088 3833 roundcube_1.6.4+dfsg-1~deb12u1.dsc
3d7bf2bba2010c171319a76a266b671e01d5c7bff3e200fe9d966bf915932dbe 220736 roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
d347dcebc705fd65214c08cdb02367e39bef9e3eba41c0affe84bc42ccec8aa9 1858152 roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
ea4e8fb414edd0961aa69d4ffba03d4981a4fad62580d88989f71489d11f3a1e 2784448 roundcube_1.6.4+dfsg.orig.tar.xz
ea53ad2d05f5fda6e7eb92d166c9500824fe4fce2879a244b9b38e21f0f4c99b 105428 roundcube_1.6.4+dfsg-1~deb12u1.debian.tar.xz
0a99971963abd91d2d8132c2fd72533da59a166359f971a9ef4ba9a9266d36ee 13981 roundcube_1.6.4+dfsg-1~deb12u1_amd64.buildinfo
Files:
4b06ae012ed25f04921e0fb757ab939a 3833 web optional roundcube_1.6.4+dfsg-1~deb12u1.dsc
b8e238bb13d3f2c9e3052bf77ab32dde 220736 web optional roundcube_1.6.4+dfsg.orig-tinymce-langs.tar.xz
e5a66bf48031beb980234a0d27d77fdf 1858152 web optional roundcube_1.6.4+dfsg.orig-tinymce.tar.xz
36dc8f64d4e01669457ca1ac400ffaa3 2784448 web optional roundcube_1.6.4+dfsg.orig.tar.xz
f807f7f43a38df78f8b17653068a21ef 105428 web optional roundcube_1.6.4+dfsg-1~deb12u1.debian.tar.xz
21039e1761310777e4fab7756ebbe7e3 13981 web optional roundcube_1.6.4+dfsg-1~deb12u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=JPSc
-----END PGP SIGNATURE-----
Reply sent
to Guilhem Moulin <guilhem@debian.org>:
You have taken responsibility.
(Sat, 28 Oct 2023 20:36:21 GMT) (full text, mbox, link).
Notification sent
to Guilhem Moulin <guilhem@debian.org>:
Bug acknowledged by developer.
(Sat, 28 Oct 2023 20:36:21 GMT) (full text, mbox, link).
Message #30 received at 1054079-close@bugs.debian.org (full text, mbox, reply):
Source: roundcube
Source-Version: 1.4.15+dfsg.1-1~deb11u1
Done: Guilhem Moulin <guilhem@debian.org>
We believe that the bug you reported is fixed in the latest version of
roundcube, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1054079@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Guilhem Moulin <guilhem@debian.org> (supplier of updated roundcube package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 18 Oct 2023 23:40:57 +0200
Source: roundcube
Architecture: source
Version: 1.4.15+dfsg.1-1~deb11u1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-lists.debian.net>
Changed-By: Guilhem Moulin <guilhem@debian.org>
Closes: 1054079
Changes:
roundcube (1.4.15+dfsg.1-1~deb11u1) bullseye-security; urgency=high
.
* New security/bugfix upstream release:
+ Fix CVE-2023-5631: Cross-site scripting (XSS) vulnerability in handling
of SVG in HTML messages. (Closes: #1054079)
* Salsa CI: Disable lintian and reprotest jobs.
* Refresh patches.
Checksums-Sha1:
7a00843c75c8bbbee2625d3fa571bfcf2accfa91 3273 roundcube_1.4.15+dfsg.1-1~deb11u1.dsc
fb0b5deacca5863d37a0b10c3771f27c91d4545e 128840 roundcube_1.4.15+dfsg.1.orig-tinymce-langs.tar.xz
a53c61b8ec041aa5a15be0da438a990a34acc072 889052 roundcube_1.4.15+dfsg.1.orig-tinymce.tar.xz
a3591df13cae970b04c53651221f316ba521c473 2976560 roundcube_1.4.15+dfsg.1.orig.tar.xz
3f9db1cb9d5a73d3f27c84c4bef04c988e297fe4 95980 roundcube_1.4.15+dfsg.1-1~deb11u1.debian.tar.xz
1e4ded25fb55afea0120b6ccb4088da34f10513b 10829 roundcube_1.4.15+dfsg.1-1~deb11u1_amd64.buildinfo
Checksums-Sha256:
169da28484e7a82978623b5311751389c07c5eebdadd1c223dbf917bf9f5add6 3273 roundcube_1.4.15+dfsg.1-1~deb11u1.dsc
d1806e62b75b5e2c8bbbce987abd3eae874f205dd560ad8f6f02a2171c8cf23a 128840 roundcube_1.4.15+dfsg.1.orig-tinymce-langs.tar.xz
b61678512254fc2af25a42ac689ac6df69bdf6d15d7aea6e9001c8868653ee74 889052 roundcube_1.4.15+dfsg.1.orig-tinymce.tar.xz
f56e664cddb698cf0eeefb1a34dd495ce0e6d29643b2e2ec0ae5cb9c6342882f 2976560 roundcube_1.4.15+dfsg.1.orig.tar.xz
d1d52e5fe6148f6a111a1295b563f885cf0f4fdba76b18a61386b3fd4c6c049f 95980 roundcube_1.4.15+dfsg.1-1~deb11u1.debian.tar.xz
44471f38e9fe60562eda90c035142d4b51c96612e3ae1c34fb74130b97ea36fc 10829 roundcube_1.4.15+dfsg.1-1~deb11u1_amd64.buildinfo
Files:
ab265a425abdd16b06d8250177823da2 3273 web optional roundcube_1.4.15+dfsg.1-1~deb11u1.dsc
450c693c68d2642b15356d06255a0d4c 128840 web optional roundcube_1.4.15+dfsg.1.orig-tinymce-langs.tar.xz
5b440fff53353d7c0ad73292c1cfe6e2 889052 web optional roundcube_1.4.15+dfsg.1.orig-tinymce.tar.xz
e98d3d252094ea231c3b02a3ff39471a 2976560 web optional roundcube_1.4.15+dfsg.1.orig.tar.xz
6b8e6b8616571d0365ba50f411b35999 95980 web optional roundcube_1.4.15+dfsg.1-1~deb11u1.debian.tar.xz
bef11cc961770f68a6d15940dd7db83c 10829 web optional roundcube_1.4.15+dfsg.1-1~deb11u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=D4Ii
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 26 Nov 2023 07:28:38 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Fri Aug 2 01:34:35 2024;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.