{"affected":[{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.8-bp156.2.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"roundcubemail","purl":"pkg:rpm/suse/roundcubemail&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.8-bp156.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.8-bp156.2.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP6","name":"roundcubemail","purl":"pkg:rpm/suse/roundcubemail&distro=SUSE%20Package%20Hub%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.8-bp156.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.8-bp156.2.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"roundcubemail","purl":"pkg:rpm/opensuse/roundcubemail&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.8-bp156.2.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.8-bp156.2.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"roundcubemail","purl":"pkg:rpm/opensuse/roundcubemail&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.8-bp156.2.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for roundcubemail fixes the following issues:\n\nUpdate to 1.6.8\nThis is a security update to the stable version 1.6 of Roundcube Webmail.\nIt provides fixes to recently reported security vulnerabilities:\n\n  * Fix XSS vulnerability in post-processing of sanitized HTML content [CVE-2024-42009]\n  * Fix XSS vulnerability in serving of attachments other than HTML or SVG [CVE-2024-42008]\n  * Fix information leak (access to remote content) via insufficient CSS filtering [CVE-2024-42010]\n\n  CHANGELOG\n\n  * Managesieve: Protect special scripts in managesieve_kolab_master mode\n  * Fix newmail_notifier notification focus in Chrome (#9467)\n  * Fix fatal error when parsing some TNEF attachments (#9462)\n  * Fix double scrollbar when composing a mail with many plain text lines (#7760)\n  * Fix decoding mail parts with multiple base64-encoded text blocks (#9290)\n  * Fix bug where some messages could get malformed in an import from a MBOX file (#9510)\n  * Fix invalid line break characters in multi-line text in Sieve scripts (#9543)\n  * Fix bug where 'with attachment' filter could fail on some fts engines (#9514)\n  * Fix bug where an unhandled exception was caused by an invalid image attachment (#9475)\n  * Fix bug where a long subject title could not be displayed in some cases (#9416)\n  * Fix infinite loop when parsing malformed Sieve script (#9562)\n  * Fix bug where imap_conn_option's 'socket' was ignored (#9566)\n  * Fix XSS vulnerability in post-processing of sanitized HTML content [CVE-2024-42009]\n  * Fix XSS vulnerability in serving of attachments other than HTML or SVG [CVE-2024-42008]\n  * Fix information leak (access to remote content) via insufficient CSS filtering [CVE-2024-42010]\n","id":"openSUSE-SU-2024:0328-1","modified":"2024-10-09T08:01:27Z","published":"2024-10-09T08:01:27Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5GOCYS6W7WGAIH6NILISNVXQC4O7Z53/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228900"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42010"}],"related":["CVE-2024-42008","CVE-2024-42009","CVE-2024-42010"],"summary":"Security update for roundcubemail","upstream":["CVE-2024-42008","CVE-2024-42009","CVE-2024-42010"]}