Bug 1091445
| Summary: | CVE-2012-4230 roundcubemail: tinymce: XSS attacks via security policy bypass [epel-6] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Vincent Danen <vdanen> |
| Component: | roundcubemail | Assignee: | Gwyn Ciesla <gwync> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | el6 | CC: | christoph.wickert, gwync, mhlavink |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | roundcubemail-1.0.2-1.el6 | Doc Type: | Release Note |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2014-09-29 16:26:56 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1091438 | ||
|
Description
Vincent Danen
2014-04-25 15:14:45 UTC
Use the following update submission link to create the Bodhi request for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. IMPORTANT: ensure that the "Close bugs when update is stable" option remains checked. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=1091438,1091445 roundcubemail-1.0.2-1.el6, php-pear-Auth-SASL-1.0.6-1.el6 has been submitted as an update for Fedora EPEL 6. https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-2650/php-pear-Auth-SASL-1.0.6-1.el6,roundcubemail-1.0.2-1.el6 roundcubemail-1.0.2-1.el6, php-pear-Auth-SASL-1.0.6-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. |