Please sync roundcube from Debian sid version 0.9.4-1.1 or greater

Bug #1256293 reported by David King
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
roundcube (Ubuntu)
Fix Released
Undecided
Unassigned
Saucy
Won't Fix
Undecided
Unassigned
Trusty
Fix Released
Undecided
Unassigned

Bug Description

Ubuntu 13.10
roundcube 0.9.2-2
Versions below 0.9.3 are affected by CVE 2013-5645, and below version 0.9.5 are affected by CVE 2013-6172 (patched in 0.9.4-1.1).

CVE References

David King (amigadave)
information type: Public → Public Security
Revision history for this message
David King (amigadave) wrote :

Following https://wiki.ubuntu.com/SyncRequestProcess#Content_of_a_sync_request

Changelog entries since 0.9.2-2:
roundcube (0.9.4-1.1) unstable; urgency=high

  * Non-maintainer upload.
  * Add CVE-2013-6172.patch patch.
    CVE-2013-6172: An attacker can overwrite configuration settings using
    user preferences. This can result in random file access and manipulated
    SQL queries. (Closes: #727668)

 -- Salvatore Bonaccorso <email address hidden> Sat, 26 Oct 2013 21:47:22 +0200

roundcube (0.9.4-1) unstable; urgency=low

  * New upstream version.
     + Fix CVE-2013-5645 (Closes: #721592)
     + "Enigma" plugin has been removed.

 -- Vincent Bernat <email address hidden> Sun, 08 Sep 2013 13:52:46 +0200

summary: - Please sync to Debian version 0.9.4-1.1 or greater
+ Please sync roundcube from Debian sid version 0.9.4-1.1 or greater
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

0.9.5-1 is currently in Ubuntu 14.04.

Changed in roundcube (Ubuntu):
status: New → Incomplete
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Revision history for this message
David King (amigadave) wrote :

I created a debdiff of the changes between 0.9.2-2 and 0.9.5-1. I had a look through the upstream git repository, but it was a bit difficult to find the specific commits that fixed the CVEs. Looking through the upstream changelog, it seems that there were mostly bugfixes between the 0.9.2 and 0.9.5 releases.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

David, thanks for the debiff, however it contains the full changeset from 0.9.2-2 to 0.9.5-1. For this issue to be fixed, you'll want to cherrypick the patches fixing the security issues and resubmit a debdiff with only these changes by following https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

NAK for the attached debdiff. Unsubscribing ubuntu-sponsors. David, when you supply an updated debdiff, please feel free to resubscribe ubuntu-security-sponsors. Thanks!

Changed in roundcube (Ubuntu Trusty):
status: Incomplete → Fix Released
Changed in roundcube (Ubuntu Saucy):
status: New → Incomplete
Revision history for this message
David King (amigadave) wrote :

Sorry, I don't have enough knowledge of Roundcube to figure out the relevant fixes for CVE-2013-5645, which was fixed in Debian by updating the package to 0.9.4-1. CVE-2013-6172 was fixed with https://github.com/roundcube/roundcubemail/commit/70c7df8faa5a9023a2773dc5a38932f1ad3a84aa applied on top of that.

Revision history for this message
Rolf Leggewie (r0lf) wrote :

saucy has seen the end of its life and is no longer receiving any updates. Marking the saucy task for this ticket as "Won't Fix".

Changed in roundcube (Ubuntu Saucy):
status: Incomplete → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.