Roundcubemail, a browser-based multilingual IMAP client, was found to have a vulnerability, which could allow an attacker to overwrite configuration settings using user preferences, that can result in random file access, manipulated SQL queries or even remote code execution (0.8.6 and older). The issues are said to be fixed in the latest release, 0.9.5. References: http://roundcube.net/news/2013/10/21/security-updates-095-and-087/ https://bugs.gentoo.org/show_bug.cgi?id=488994
Created roundcubemail tracking bugs for this issue: Affects: epel-all [bug 1021965]
Upstream bug report and patch: http://trac.roundcube.net/ticket/1489382 http://trac.roundcube.net/changeset/70c7df8faa5a9023a2773dc5a38932f1ad3a84aa/github This was fixed in Fedora and EPEL via roundcubemail-0.9.5-1.