Summary: | <mail-client/roundcube-1.2.3: Vulnerability in handling of mail()'s 5th argument (CVE-2016-9920) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Philippe Chaintreuil <gentoo_bugs_2_peep> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | hydrapolic, jstein, tb, titanofold, web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://roundcube.net/news/2016/11/28/updates-1.2.3-and-1.1.7-released | ||
Whiteboard: | B1 [glsa cve cleanup] | ||
Package list: | Runtime testing required: | --- |
Description
Philippe Chaintreuil
2016-12-02 00:09:17 UTC
Can confirm: just renaming roundcube-1.2.2.ebuild to roundcube-1.2.3.ebuild worked just fine for me. Converting this report into a security bug. Thanks for the report! CVE-2016-9920 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9920): steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message. I bumped the package, https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ec8ab56776b3bf6fd4d5faee022ffeaa9bd6c423 @ Arches, please test and mark stable: =mail-client/roundcube-1.2.3 amd64 stable x86 stable arm stable, all arches done. New GLSA created. @ Maintainer(s): Please cleanup! (In reply to Thomas Deutschmann from comment #8) > New GLSA created. > > @ Maintainer(s): Please cleanup! Done This issue was resolved and addressed in GLSA 201612-44 at https://security.gentoo.org/glsa/201612-44 by GLSA coordinator Aaron Bauman (b-man). |