Source: roundcube
Version: 1.6.10+dfsg-2
Severity: grave
Control: found -1 1.6.5+dfsg-1+deb12u4
Control: found -1 1.4.15+dfsg.1-1+deb11u4
Tags: security upstream
Justification: user security hole
Roundcube webmail upstream has recently released 1.6.10 [0] which fixes
the following vulnerability:
* Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.
https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d
AFAICT no CVE-ID has been published for this issue. Will request one
tomorrow if no one beats me to it.
--
Guilhem.
[0]
https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEERpy6p3b9sfzUdbME05pJnDwhpVIFAmg8GOsACgkQ05pJnDwh pVI9eBAAlta3qLx2GS0/i8NfDO9GD/DrZMmF3mfT1UsL+VZUNRcisYLG6XkOaH5C RswLofEm8ohaKrmpuxYlOaCpoKPTfI+Zan6wdDVRmUA/ipEp+4Du7hqNblEIxxAs WZ/1Ac/AKO5dU+fhYOk+/pivAWRBbJ8tpPiaURuPMPnHcLvjg5KqYSnLUzse9m+o pIaai8sl/3KhbFgM5vLCfXCW5I46bAPAPHyYwz8jCOYKqhJNurYDBwq2q3VRhdo8 37Px6It86X7iV5gVR3OnwBvLUGWO2SS6Rk8gyLc2JQF05oHiIh+ppGc0Di/wWyZN rwxbUuJusoxUeDUJS/8agdVs5y7vpOlA2RrqUJNEDoo5c4eY5oM3mxJtddutVqt2 RQGT9JqSMjvWIPiRtb2g6G8Cyd8lHsLFdtl31vuPMKyu4yDfgcwzkHRXpXaibIVA 29In172RO1w3mqGmPLPUfBim5PRr74E6xoSt1Egsym0beMcGsJh8jV9wn6Y3UgsO sxWdQYVwUZ3L621JFmVldnD0w90kuKe77GaM5DHqx7t20PN9nhbLCLiaSaiYw2MK 0vC6nNb3Q1c7aZ6XX6f3H7haR4lVc0ALSprWuKaaTxHyJV74jlynXc9g88Ogu8Hk UDtizyjUXMFhEnUc3Us//5JcBUyxmGuf0oTeQ/7fG9UqXAl7npY=
=NyjD
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)