A flaw in Roundcube's handling of configuration files may allow arbitrary code execution, amongst other vulnerabilities.
| Package | mail-client/roundcube on all architectures | 
|---|---|
| Affected versions | < 1.4.4 < 1.3.11 | 
| Unaffected versions | >= 1.4.4 >= 1.3.11 | 
Free and open source webmail software for the masses, written in PHP.
Multiple vulnerabilities have been discovered in Roundcube. Please review the CVE identifiers referenced below for details.
Please review the referenced CVE identifiers for details.
There is no known workaround at this time.
All Roundcube 1.4.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.4.4"
All Roundcube 1.3.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.3.11"
      Release date
      
      July 27, 2020
    
      Latest revision
      
      July 27, 2020: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries