Roundcube: Multiple vulnerabilities — GLSA 202007-41

A flaw in Roundcube's handling of configuration files may allow arbitrary code execution, amongst other vulnerabilities.

Affected packages

mail-client/roundcube on all architectures
Affected versions < 1.4.4
< 1.3.11
Unaffected versions >= 1.4.4
>= 1.3.11

Background

Free and open source webmail software for the masses, written in PHP.

Description

Multiple vulnerabilities have been discovered in Roundcube. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Roundcube 1.4.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.4.4"
 

All Roundcube 1.3.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.3.11"
 

References

Release date
July 27, 2020

Latest revision
July 27, 2020: 1

Severity
normal

Exploitable
remote

Bugzilla entries