openSUSE Security Update: Security update for roundcubemail ______________________________________________________________________________ Announcement ID: openSUSE-SU-2023:0345-1 Rating: important References: #1216429 Cross-References: CVE-2023-5631 CVSS scores: CVE-2023-5631 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVE-2023-5631 (SUSE): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for roundcubemail fixes the following issues: Update to version 1.6.4 (boo#1216429): * CVE-2023-5631: Fix cross-site scripting vulnerability in handling of SVG in HTML messages * Fix PHP8 warnings * Fix default 'mime.types' path on Windows * Managesieve: Fix javascript error when relational or spamtest extension is not enabled Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2023-345=1 Package List: - openSUSE Backports SLE-15-SP5 (noarch): roundcubemail-1.6.4-bp155.2.6.1 References: https://www.suse.com/security/cve/CVE-2023-5631.html https://bugzilla.suse.com/1216429