{"affected":[{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.4-bp155.2.6.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"roundcubemail","purl":"pkg:rpm/suse/roundcubemail&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.4-bp155.2.6.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"roundcubemail":"1.6.4-bp155.2.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"roundcubemail","purl":"pkg:rpm/opensuse/roundcubemail&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.6.4-bp155.2.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for roundcubemail fixes the following issues:\n\nUpdate to version 1.6.4 (boo#1216429):\n\n* CVE-2023-5631: Fix cross-site scripting vulnerability in handling of SVG in HTML messages \n* Fix PHP8 warnings\n* Fix default 'mime.types' path on Windows\n* Managesieve: Fix javascript error when relational or spamtest extension is not enabled\n","id":"openSUSE-SU-2023:0345-1","modified":"2023-11-02T11:05:52Z","published":"2023-11-02T11:05:52Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGRBYUWS4WS3V7Z75JPLZ6VMUDQER3SA/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216429"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5631"}],"related":["CVE-2023-5631"],"summary":"Security update for roundcubemail","upstream":["CVE-2023-5631"]}