[Git][security-tracker-team/security-tracker][master] Merge CVEs from th Roundcube 1.7-rc6, 1.6.15 and 1.5.15 release
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Apr 3 08:28:56 BST 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
84d9c9fc by Salvatore Bonaccorso at 2026-04-03T09:28:23+02:00
Merge CVEs from th Roundcube 1.7-rc6, 1.6.15 and 1.5.15 release
- - - - -
2 changed files:
- data/CVE/list
- data/DLA/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -16,8 +16,6 @@ CVE-2026-5420 (A security flaw has been discovered in Shinrays Games Goods Tripl
NOT-FOR-US: Shinrays Games Goods Triple App
CVE-2026-35549 (An issue was discovered in MariaDB Server before 11.4.10, 11.5.x throu ...)
TODO: check
-CVE-2026-35545 (An issue was discovered in Roundcube Webmail before 1.5.15 and 1.6.15. ...)
- TODO: check
CVE-2026-35544 (An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. ...)
TODO: check
CVE-2026-35543 (An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. ...)
@@ -2202,11 +2200,12 @@ CVE-2018-25226 (FTPShell Server 6.83 contains a buffer overflow vulnerability th
TODO: check
CVE-2026-4981
NOT-FOR-US: Red Hat Advanced Cluster Security
-CVE-2026-XXXX [SVG Animate FUNCIRI Attribute Bypass]
+CVE-2026-35545 [SVG Animate FUNCIRI Attribute Bypass]
- roundcube 1.6.15+dfsg-1 (bug #1132268)
- [bullseye] - roundcube 1.4.15+dfsg.1-1+deb11u8
NOTE: https://roundcube.net/news/2026/03/29/security-updates-1.7-rc6-1.6.15-1.5.15
- NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/9d18d524f3cc211003fc99e2e54eed09a2f3da88
+ NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/7ad62de184368bf42c0f522d1aacc030f5ddcc46 (1.7-rc6)
+ NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/9d18d524f3cc211003fc99e2e54eed09a2f3da88 (1.6.15)
+ NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/fe1320b199d3a2f58351bb699c9ed4316e73221b (1.5.15)
CVE-2026-5119 (A flaw was found in libsoup. When establishing HTTPS tunnels through a ...)
- libsoup3 <unfixed> (bug #1132331)
[trixie] - libsoup3 <no-dsa> (Minor issue)
=====================================
data/DLA/list
=====================================
@@ -11,6 +11,7 @@
{CVE-2023-52892 CVE-2026-32935}
[bullseye] - phpseclib 1.0.19-3+deb11u3
[30 Mar 2026] DLA-4517-1 roundcube - security update
+ {CVE-2026-35545}
[bullseye] - roundcube 1.4.15+dfsg.1-1+deb11u8
[30 Mar 2026] DLA-4516-1 gst-plugins-ugly1.0 - security update
{CVE-2026-2920 CVE-2026-2922}
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d9c9fc7ebe3c7f4ad7b36e592ef5c8a8309f85
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d9c9fc7ebe3c7f4ad7b36e592ef5c8a8309f85
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260403/ee518e8e/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list