security update in Fedora EPEL 7 for roundcubemail

Status: obsolete

Version 1.1.11

This is a security update to the stable version 1.1. It fixes a recently reported vulnerability allowing IMAP command injection via a GET parameters. More details about this are published under CVE-2018-9846.

The second fix is about a missed remote content blocking on HTML messages with specially crafted image and style tags.

We strongly recommend to update all productive installations of Roundcube 1.1.x. Please do backup your data before updating!


  • Don't ignore (global) userlogins/sendmail logs in per_user_logging mode
  • Fix security issue in remote content blocking on HTML image and style tags (#6178)
  • Fix check_request() bypass in places using get_uids() [CVE-2018-9846] (#6238)
  • Fix possible IMAP command injection vulnerability [CVE-2018-9846] (#6229)

Comments 5

This update has been submitted for testing by remi.

This update has been pushed to testing.

Please update to v1.1.12 instead, which was released yesterday and fixes a regression

This update has been obsoleted by roundcubemail-1.1.12-1.el7.

Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines

Is the update generally functional? (karma)

You need to be logged in to add karma!

#1566744 CVE-2018-9846 roundcubemail: MX injection in archive.php [epel-all]
Content Type
Test Gating
Submitted by
Update Type
Update Severity
stable threshold: 3
unstable threshold: -3
submitted a year ago
in testing a year ago

Related Bugs 1

00 #1566744 CVE-2018-9846 roundcubemail: MX injection in archive.php [epel-all]

Automated Test Results