Arches, please test and mark stable: =mail-client/roundcube-0.5.1
amd64 ok
amd64 done, thanks Agostino
This is a security update.
ppc done
Tested on x86, all good here ...
(In reply to comment #5) > Tested on x86, all good here ... +1 :-)
x86 stable, thanks Andreas and David.
ppc64 stable,
arm stable, sparc is not stable
Thanks, everyone. Closing noglsa since these are CSRF vulns.
CVE-2011-1492 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1492): steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request. CVE-2011-1491 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1491): The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.