Roundcube has released a bug fix version of their new 0.9.x line. Contains bug fixes and a fix for "wo recently reposted XSS vulnerabilities with HTML messages and signatures". Probably just needs the 0.9.2 ebuild to be renamed. Reproducible: Always
Thanks for the report.
CVE-2013-5645 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5645): Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
Arches, please stabilize: =mail-client/roundcube-0.9.3
amd64 stable
arm stable
ppc stable
x86 stable
Closing noglsa for XSS.