[Bug 209841] mail/roundcube: 1.1.5 vulnerable to CVE-2016-5103
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sun May 29 19:44:29 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209841
Bug ID: 209841
Summary: mail/roundcube: 1.1.5 vulnerable to CVE-2016-5103
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: https://github.com/roundcube/roundcubemail/issues/5240
OS: Any
Status: New
Keywords: patch, security
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: ale at FreeBSD.org
Reporter: vlad-fbsd at acheronmedia.com
CC: ale at FreeBSD.org
Attachment #170808 maintainer-approval?(ale at FreeBSD.org)
Flags:
Flags: maintainer-feedback?(ale at FreeBSD.org),
merge-quarterly?
Assignee: ale at FreeBSD.org
CC: ale at FreeBSD.org
Created attachment 170808
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=170808&action=edit
Patch roundcube against CVE-2016-5103
The current version of Roundcube, v1.1.5, is vulnerable to CVE-2016-5103.
* Upstream Issue: https://github.com/roundcube/roundcubemail/issues/5240
* CVE assignment: http://seclists.org/oss-sec/2016/q2/414
The upstream has not yet released a version that would include the fix.
I don't know what changes against vuxml should be done in order to submit a
patch myself.
I've attached a patch for Roundcube, in case the maintainer wants to apply it
until the upstream releases a new version. Portlint pass. port test pass.
Testing in production right now.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list