Change log for squirrelmail package in Ubuntu

171 of 71 results
Published in xenial-updates
Published in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u3ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Cross-site scripting (XSS) vulnerability
    - debian/patches/CVE-2019-12970.patch: Fix XSS due to improper handling
      of RCDATA and RAWTEXT elements.
    - CVE-2019-12970

 -- Paulo Flabiano Smorigo <email address hidden>  Wed, 09 Dec 2020 14:57:30 +0000
Superseded in xenial-updates
Superseded in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u3ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: XSS vulnerabilities
    - CVE-2018-14950-55.patch: Non-maintainer upload by the Debian LTS Team.
      Fix for several XSS vulnerabilities
    - CVE-2018-14950 CVE-2018-14951 CVE-2018-14952 CVE-2018-14953 CVE-2018-14954
      CVE-2018-14955

 -- Mike Salvatore <email address hidden>  Fri, 31 Aug 2018 10:44:45 -0400
Published in trusty-updates
Published in trusty-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u3build0.14.04.1) trusty-security; urgency=medium

  * fake sync from Debian

Superseded in xenial-updates
Superseded in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u2ubuntu0.16.04.3) xenial-security; urgency=medium

  [ Nishanth Aravamudan ]
  * debian/patches/php7_remove_e_modifier_preg_replace: Remove use of
    deprecated /e modifier in preg_replace.  Thanks to Thijs Kinkhorst
    <email address hidden>.  Closes LP: #1636333.

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 11 Apr 2018 14:24:18 -0300
Superseded in xenial-updates
Superseded in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u2ubuntu0.16.04.2) xenial-security; urgency=medium

  [ Nishanth Aravamudan ]
  * Update to PHP7.0 dependencies (LP: #1566587).

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 10 Apr 2018 14:24:53 -0300
Superseded in xenial-updates
Superseded in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u2build0.16.04.1) xenial-security; urgency=medium

  * fake sync from Debian

Superseded in trusty-updates
Superseded in trusty-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u2build0.14.04.1) trusty-security; urgency=medium

  * fake sync from Debian

Superseded in trusty-updates
Superseded in trusty-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u1build0.14.04.1) trusty-security; urgency=medium

  * fake sync from Debian

Obsolete in yakkety-updates
Obsolete in yakkety-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u1ubuntu0.16.10.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: post-auth remote code execution
    - debian/patches/CVE-2017-7692.patch: perform escaping on input
    - CVE-2017-7692

 -- Steve Beattie <email address hidden>  Fri, 19 May 2017 15:52:58 -0700
Superseded in xenial-updates
Superseded in xenial-security
squirrelmail (2:1.4.23~svn20120406-2+deb8u1ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: post-auth remote code execution
    - debian/patches/CVE-2017-7692.patch: perform escaping on input
      (thanks to debian)
    - CVE-2017-7692

 -- Steve Beattie <email address hidden>  Fri, 19 May 2017 15:28:31 -0700
Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
squirrelmail (2:1.4.23~svn20120406-2ubuntu1.16.04.1) xenial; urgency=medium

  * debian/patches/php7_remove_e_modifier_preg_replace: Remove use of
    deprecated /e modifier in preg_replace.  Thanks to Thijs Kinkhorst
    <email address hidden>.  Closes LP: #1636333.

 -- Nishanth Aravamudan <email address hidden>  Mon, 28 Nov 2016 16:31:02 -0800
Superseded in yakkety-updates
Deleted in yakkety-proposed (Reason: moved to -updates)
squirrelmail (2:1.4.23~svn20120406-2ubuntu1.16.10.1) yakkety; urgency=medium

  * debian/patches/php7_remove_e_modifier_preg_replace: Remove use of
    deprecated /e modifier in preg_replace.  Thanks to Thijs Kinkhorst
    <email address hidden>.  Closes LP: #1636333.

 -- Nishanth Aravamudan <email address hidden>  Mon, 28 Nov 2016 16:27:50 -0800
Deleted in zesty-release (Reason: (From Debian) RoQA; RC-buggy; little upstream activity; D...)
Deleted in zesty-proposed (Reason: moved to release)
squirrelmail (2:1.4.23~svn20120406-2ubuntu2) zesty; urgency=medium

  * debian/patches/php7_remove_e_modifier_preg_replace: Remove use of
    deprecated /e modifier in preg_replace.  Thanks to Thijs Kinkhorst
    <email address hidden>.  Closes LP: #1636333.

 -- Nishanth Aravamudan <email address hidden>  Mon, 28 Nov 2016 16:23:55 -0800
Superseded in zesty-release
Obsolete in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
squirrelmail (2:1.4.23~svn20120406-2ubuntu1) xenial; urgency=medium

  * Update to PHP7.0 dependencies (LP: #1566587).

 -- Nishanth Aravamudan <email address hidden>  Tue, 05 Apr 2016 16:58:07 -0700
Superseded in xenial-release
Obsolete in wily-release
Obsolete in vivid-release
Obsolete in utopic-release
Published in trusty-release
Obsolete in saucy-release
Obsolete in raring-release
Deleted in raring-proposed (Reason: moved to release)
squirrelmail (2:1.4.23~svn20120406-2) unstable; urgency=medium


  * Add patch from upstream to cope with changed behaviour of
    htmlspecialchars() in PHP 5.4 (closes: #664895).
  * Add patch from upstream to cope with removal of
    session_unregister() in PHP 5.4.

 -- Thijs Kinkhorst <email address hidden>  Thu, 20 Dec 2012 20:41:02 +0100
Superseded in raring-release
Obsolete in quantal-release
squirrelmail (2:1.4.23~svn20120406-1) unstable; urgency=medium


  * New upstream snapshot release.
    - Addresses PHP 5.4 compatibility issues (closes: #664895).
    - Fixes PHP warning (closes: #641869).
    - Fixes hide_auth_header (closes: #661394).

 -- Thijs Kinkhorst <email address hidden>  Fri, 06 Apr 2012 13:18:54 +0200
Superseded in quantal-release
Published in precise-release
Obsolete in oneiric-release
squirrelmail (2:1.4.22-1) unstable; urgency=medium
  * New upstream release, fixes several security issues    (CVE-2011-2023, CVE-2010-4554, CVE-2010-4555,     closes: #593345, #634822).  * Move to dpkg source format 3.0, separate out Debian patches.    Small packaging cleanups. -- Thijs Kinkhorst <email address hidden>  Sun, 24 Jul 2011 14:40:01 +0000
Superseded in oneiric-release
Obsolete in natty-release
Obsolete in maverick-release
squirrelmail (2:1.4.21-1) unstable; urgency=medium

  * New upstream release.
    + Addresses two low-imact security issues, bump urgency.
      [CVE-2010-1637, CVE-2010-2813]
  * Checked for policy 3.9.1, no changes necessary.
 -- Bhavani Shankar <email address hidden>   Sat, 31 Jul 2010 13:54:45 +0200

Available diffs

Obsolete in hardy-updates
Obsolete in hardy-security
squirrelmail (2:1.4.13-2ubuntu1.6) hardy-security; urgency=low

  * SECURITY UPDATE: (LP: #598077)
  * The Mail Fetch plugin allows remote authenticated users to bypass firewall
    restrictions and use SquirrelMail as a proxy to scan internal networks via
    a modified POP3 port number.
    - http://squirrelmail.org/security/issue/2010-06-21
    - CVE-2010-1637
    - Patch taken from upstream svn rev. 13951. Applied inline.
 -- Andreas Wenning <email address hidden>   Thu, 24 Jun 2010 14:16:06 +0200
Obsolete in jaunty-updates
Obsolete in jaunty-security
squirrelmail (2:1.4.15-4ubuntu0.4) jaunty-security; urgency=low

  * SECURITY UPDATE: (LP: #598077)
  * The Mail Fetch plugin allows remote authenticated users to bypass firewall
    restrictions and use SquirrelMail as a proxy to scan internal networks via
    a modified POP3 port number.
    - http://squirrelmail.org/security/issue/2010-06-21
    - CVE-2010-1637
    - Patch taken from upstream svn rev. 13951. Applied inline.
 -- Andreas Wenning <email address hidden>   Thu, 24 Jun 2010 14:16:52 +0200
Obsolete in karmic-updates
Obsolete in karmic-security
squirrelmail (2:1.4.19-1ubuntu0.2) karmic-security; urgency=low

  * SECURITY UPDATE: (LP: #598077)
  * The Mail Fetch plugin allows remote authenticated users to bypass firewall
    restrictions and use SquirrelMail as a proxy to scan internal networks via
    a modified POP3 port number.
    - http://squirrelmail.org/security/issue/2010-06-21
    - CVE-2010-1637
    - Patch taken from upstream svn rev. 13951. Applied inline.
 -- Andreas Wenning <email address hidden>   Thu, 24 Jun 2010 14:17:43 +0200
Obsolete in lucid-updates
Obsolete in lucid-security
squirrelmail (2:1.4.20-1ubuntu0.1) lucid-security; urgency=low

  * SECURITY UPDATE: (LP: #598077)
  * The Mail Fetch plugin allows remote authenticated users to bypass firewall
    restrictions and use SquirrelMail as a proxy to scan internal networks via
    a modified POP3 port number.
    - http://squirrelmail.org/security/issue/2010-06-21
    - CVE-2010-1637
    - Patch taken from upstream svn rev. 13951. Applied inline.
 -- Andreas Wenning <email address hidden>   Thu, 24 Jun 2010 14:18:27 +0200
Superseded in maverick-release
squirrelmail (2:1.4.20-1ubuntu1) maverick; urgency=low

  * SECURITY UPDATE: (LP: #598077)
  * The Mail Fetch plugin allows remote authenticated users to bypass firewall
    restrictions and use SquirrelMail as a proxy to scan internal networks via
    a modified POP3 port number.
    - http://squirrelmail.org/security/issue/2010-06-21
    - CVE-2010-1637
    - Patch taken from upstream svn rev. 13951. Applied inline.
 -- Andreas Wenning <email address hidden>   Thu, 24 Jun 2010 14:19:29 +0200

Available diffs

Superseded in maverick-release
Obsolete in lucid-release
squirrelmail (2:1.4.20-1) unstable; urgency=low

  * New upstream release.
    + Addresses search bug (closes: #550763).
  * Update to policy 3.8.4, no changes necessary.
 -- Andreas Wenning <email address hidden>   Mon,  22 Mar 2010 18:25:35 +0000

Available diffs

Superseded in karmic-security
Superseded in karmic-updates
Superseded in karmic-updates
Superseded in karmic-security
Deleted in karmic-proposed (Reason: copied to -updates)
squirrelmail (2:1.4.19-1ubuntu0.1) karmic-security; urgency=low

  * SECURITY UPDATE: (LP: #446838)
  * Multiple cross-site request forgery (CSRF) in all
    forms submissions
  * edited:
    src/addrbook_search_html.php,src/addressbook.php,src/compose.php
    src/folders_create.php,src/folders_delete.php,src/folders.php,
    src/folders_rename_do.php,src/folders_rename_getname.php,
    src/folders_subscribe.php,functions/forms.php,
    functions/mailbox_display.php,src/move_messages.php,
    src/options_highlight.php,src/options_identities.php,
    src/options_order.php,src/options.php,src/search.php,
    functions/strings.php,src/vcard.php
  * Fixes : CVE-2009-2964
    - http://www.squirrelmail.org/security/issue/2009-08-12
    - patches taken from upstream rev 13818
    - patches applied inline
 -- Leonel Nunez <email address hidden>   Sun, 11 Oct 2009 19:18:52 -0600
Superseded in jaunty-updates
Superseded in jaunty-security
Deleted in jaunty-proposed (Reason: moved to -updates)
Superseded in jaunty-proposed
squirrelmail (2:1.4.15-4ubuntu0.3) jaunty-security; urgency=low

  * SECURITY UPDATE: (LP: #446838)
  * Multiple cross-site request forgery (CSRF) in all
    forms submissions
  * edited:
    src/addrbook_search_html.php,src/addressbook.php,src/compose.php
    src/folders_create.php,src/folders_delete.php,src/folders.php,
    src/folders_rename_do.php,src/folders_rename_getname.php,
    src/folders_subscribe.php,functions/forms.php,
    functions/mailbox_display.php,src/move_messages.php,
    src/options_highlight.php,src/options_identities.php,
    src/options_order.php,src/options.php,src/search.php,
    functions/strings.php,src/vcard.php
  * Fixes : CVE-2009-2964
    - http://www.squirrelmail.org/security/issue/2009-08-12
    - patches taken from upstream rev 13818
    - patches applied inline
 -- Leonel Nunez <email address hidden>   Sat, 10 Oct 2009 19:30:41 -0600
Obsolete in intrepid-updates
Obsolete in intrepid-security
Deleted in intrepid-proposed (Reason: moved to -updates)
Superseded in intrepid-proposed
squirrelmail (2:1.4.15-3ubuntu0.4) intrepid-security; urgency=low

  * SECURITY UPDATE: (LP: #446838)
  * Multiple cross-site request forgery (CSRF) in all
    forms submissions
  * edited:
    src/addrbook_search_html.php,src/addressbook.php,src/compose.php
    src/folders_create.php,src/folders_delete.php,src/folders.php,
    src/folders_rename_do.php,src/folders_rename_getname.php,
    src/folders_subscribe.php,functions/forms.php,
    functions/mailbox_display.php,src/move_messages.php,
    src/options_highlight.php,src/options_identities.php,
    src/options_order.php,src/options.php,src/search.php,
    functions/strings.php,src/vcard.php
  * Fixes : CVE-2009-2964
    - http://www.squirrelmail.org/security/issue/2009-08-12
    - patches taken from upstream rev 13818
    - patches applied inline
 -- Leonel Nunez <email address hidden>   Sun, 11 Oct 2009 21:33:16 -0600
Superseded in hardy-updates
Superseded in hardy-security
Deleted in hardy-proposed (Reason: moved to -updates)
Superseded in hardy-proposed
squirrelmail (2:1.4.13-2ubuntu1.5) hardy-security; urgency=low

  * SECURITY UPDATE: (LP: #446838)
  * Multiple cross-site request forgery (CSRF) in all
    forms submissions
  * edited:
    src/addrbook_search_html.php,src/addressbook.php,src/compose.php
    src/folders_create.php,src/folders_delete.php,src/folders.php,
    src/folders_rename_do.php,src/folders_rename_getname.php,
    src/folders_subscribe.php,functions/forms.php,
    functions/mailbox_display.php,src/move_messages.php,
    src/options_highlight.php,src/options_identities.php,
    src/options_order.php,src/options.php,src/search.php,
    functions/strings.php,src/vcard.php
  * Fixes : CVE-2009-2964
    - http://www.squirrelmail.org/security/issue/2009-08-12
    - patches taken from upstream rev 13818
    - patches applied inline
 -- Leonel Nunez <email address hidden>   Sun, 11 Oct 2009 06:41:56 -0600
Superseded in lucid-release
squirrelmail (2:1.4.20~rc2-1) unstable; urgency=medium

  * New upstream release candidate.
    + Addresses cross site request forgery (CVE-2009-2964,
      closes: #543818).
  * Update to policy 3.8.3, no changes necessary.
 -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  06 Nov 2009 10:36:03 +0000

Available diffs

Superseded in jaunty-updates
Superseded in jaunty-security
squirrelmail (2:1.4.15-4ubuntu0.2) jaunty-security; urgency=low

  * SECURITY UPDATE: (LP: #396306)
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - Fixes incomplete fix for CVE-2009-1579
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1381
    - Patch taken from upstream svn rev. 13733. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 07 Jul 2009 02:39:55 +0200
Superseded in intrepid-updates
Superseded in intrepid-security
squirrelmail (2:1.4.15-3ubuntu0.3) intrepid-security; urgency=low

  * SECURITY UPDATE: (LP: #396306)
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - Fixes incomplete fix for CVE-2009-1579
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1381
    - Patch taken from upstream svn rev. 13733. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 07 Jul 2009 02:48:17 +0200
Superseded in hardy-updates
Superseded in hardy-security
squirrelmail (2:1.4.13-2ubuntu1.4) hardy-security; urgency=low

  * SECURITY UPDATE: (LP: #396306)
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - Fixes incomplete fix for CVE-2009-1579
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1381
    - Patch taken from upstream svn rev. 13733. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 07 Jul 2009 02:50:06 +0200
Superseded in lucid-release
Obsolete in karmic-release
squirrelmail (2:1.4.19-1) unstable; urgency=high

  * New upstream release.
    + Corrects incomplete fix for CVE-2009-1579 [CVE-2009-1381]
    + Fixes filter plugin regression (closes: #529328)

 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  01 Jun 2009 10:46:28 +0100

Available diffs

Superseded in hardy-updates
Superseded in hardy-security
squirrelmail (2:1.4.13-2ubuntu1.3) hardy-security; urgency=low

  * SECURITY UPDATE: (LP: #375513)
  * Multiple cross site scripting issues. Two issues were fixed that both
    allowed an attacker to run arbitrary script (XSS) on most any
    SquirrelMail page by getting the user to click on specially crafted
    SquirrelMail links.
    - http://squirrelmail.org/security/issue/2009-05-08
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13670. Applied inline.
  * Cross site scripting issues in decrypt_headers.php. An issue was fixed
    wherein input to the contrib/decrypt_headers.php script was not sanitized
    and allowed arbitrary script execution upon submission of certain values.
    - http://squirrelmail.org/security/issue/2009-05-09
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13672. Applied inline.
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1579
    - Patch taken from upstream svn rev. 13674. Applied inline.
  * Session fixation vulnerability. An issue was fixed that allowed an
    attacker to possibly steal user data by hijacking the SquirrelMail
    login session.
    - http://squirrelmail.org/security/issue/2009-05-11
    - CVE-2009-1580
    - Patch taken from upstream svn rev. 13676. Applied inline.
  * CSS positioning vulnerability. An issue was fixed that allowed phishing
    and cross-site scripting (XSS) attacks to be run by surreptitious
    placement of content in specially-crafted emails sent to SquirrelMail
    users.
    - http://squirrelmail.org/security/issue/2009-05-12
    - CVE-2009-1581
    - Patch taken from upstream svn rev. 13667. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 12 May 2009 21:13:30 +0200
Superseded in jaunty-updates
Superseded in jaunty-security
squirrelmail (2:1.4.15-4ubuntu0.1) jaunty-security; urgency=low

  * SECURITY UPDATE: (LP: #375513)
  * Multiple cross site scripting issues. Two issues were fixed that both
    allowed an attacker to run arbitrary script (XSS) on most any
    SquirrelMail page by getting the user to click on specially crafted
    SquirrelMail links.
    - http://squirrelmail.org/security/issue/2009-05-08
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13670. Applied inline.
  * Cross site scripting issues in decrypt_headers.php. An issue was fixed
    wherein input to the contrib/decrypt_headers.php script was not sanitized
    and allowed arbitrary script execution upon submission of certain values.
    - http://squirrelmail.org/security/issue/2009-05-09
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13672. Applied inline.
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1579
    - Patch taken from upstream svn rev. 13674. Applied inline.
  * Session fixation vulnerability. An issue was fixed that allowed an
    attacker to possibly steal user data by hijacking the SquirrelMail
    login session.
    - http://squirrelmail.org/security/issue/2009-05-11
    - CVE-2009-1580
    - Patch taken from upstream svn rev. 13676. Applied inline.
  * CSS positioning vulnerability. An issue was fixed that allowed phishing
    and cross-site scripting (XSS) attacks to be run by surreptitious
    placement of content in specially-crafted emails sent to SquirrelMail
    users.
    - http://squirrelmail.org/security/issue/2009-05-12
    - CVE-2009-1581
    - Patch taken from upstream svn rev. 13667. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 12 May 2009 21:06:15 +0200
Superseded in intrepid-updates
Superseded in intrepid-security
squirrelmail (2:1.4.15-3ubuntu0.2) intrepid-security; urgency=low

  * SECURITY UPDATE: (LP: #375513)
  * Multiple cross site scripting issues. Two issues were fixed that both
    allowed an attacker to run arbitrary script (XSS) on most any
    SquirrelMail page by getting the user to click on specially crafted
    SquirrelMail links.
    - http://squirrelmail.org/security/issue/2009-05-08
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13670. Applied inline.
  * Cross site scripting issues in decrypt_headers.php. An issue was fixed
    wherein input to the contrib/decrypt_headers.php script was not sanitized
    and allowed arbitrary script execution upon submission of certain values.
    - http://squirrelmail.org/security/issue/2009-05-09
    - CVE-2009-1578
    - Patch taken from upstream svn rev. 13672. Applied inline.
  * Server-side code injection in map_yp_alias username map. An issue was
    fixed that allowed arbitrary server-side code execution when SquirrelMail
    was configured to use the example "map_yp_alias" username mapping
    functionality.
    - http://squirrelmail.org/security/issue/2009-05-10
    - CVE-2009-1579
    - Patch taken from upstream svn rev. 13674. Applied inline.
  * Session fixation vulnerability. An issue was fixed that allowed an
    attacker to possibly steal user data by hijacking the SquirrelMail
    login session.
    - http://squirrelmail.org/security/issue/2009-05-11
    - CVE-2009-1580
    - Patch taken from upstream svn rev. 13676. Applied inline.
  * CSS positioning vulnerability. An issue was fixed that allowed phishing
    and cross-site scripting (XSS) attacks to be run by surreptitious
    placement of content in specially-crafted emails sent to SquirrelMail
    users.
    - http://squirrelmail.org/security/issue/2009-05-12
    - CVE-2009-1581
    - Patch taken from upstream svn rev. 13667. Applied inline.

 -- Andreas Wenning <email address hidden>   Tue, 12 May 2009 21:09:43 +0200
Superseded in karmic-release
squirrelmail (2:1.4.18-1) unstable; urgency=high

  * New upstream release.
    + Addresses several security issues (closes: #528528):
      CVE-2009-1578, CVE-2009-1579, CVE-2009-1580, CVE-2009-1581.
  * Update to debhelper 7 and policy 3.8.1.
  * Make squirrelmail.cron.daily cope with the administrator
    enabling the hashed dir feature, thanks Marcello Nuccio
    (closes: #508287).
  * Update Recommends and Suggests:
    + Remove all php4-related relations.
    + Add recommends for php5-mcode which speeds up crypto.
    + Suggest php5-recode for some character sets.
    + Recommend plugins: squirrelmail-viewashtml for HTML mail,
      squirrelmail-logger to provide logging.
    (closes: #523966, #527964)

 -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  15 May 2009 11:13:44 +0100

Available diffs

Obsolete in dapper-updates
Obsolete in dapper-security
squirrelmail (2:1.4.6-1ubuntu0.3) dapper-security; urgency=low

  * SECURITY UPDATE: Possible cookie theft in src/redirect.php if
    register_globals is enabled, and malicous site is running in same
    domain. Patch taken from upstream svn rev 10851. (LP: #348839)
    - CVE-2006-3665
  * SECURITY UPDATE: Possible cross-site scripting (XSS) vulnerability in
    search.php, when register_globals is enabled. Patch taken from upstream
    svn rev 11319. (LP: #348839)
    - CVE-2006-3174
    - http://squirrelmail.org/security/issue/2006-06-22

 -- Andreas Wenning <email address hidden>   Thu, 26 Mar 2009 14:21:47 +0100
Superseded in dapper-updates
Superseded in dapper-security
squirrelmail (2:1.4.6-1ubuntu0.2) dapper-security; urgency=low

  * SECURITY UPDATE: cross site scripting issue in the HTML filter.
    Patch taken from upstream release. (LP: #306536)
    - CVE-2008-2379
    - http://www.squirrelmail.org/security/issue/2008-12-04
  * SECURITY UPDATE: Cookies sent over HTTPS will now be confined to
    HTTPS only (cookie secure flag) and more support for the HTTPOnly
    cookie attribute. Patch taken from upstream release. (LP: #328938)
    - CVE-2008-3663
    - http://www.squirrelmail.org/security/issue/2008-09-28

 -- Andreas Wenning <email address hidden>   Fri, 13 Feb 2009 06:25:43 +0100
Superseded in hardy-updates
Superseded in hardy-security
squirrelmail (2:1.4.13-2ubuntu1.2) hardy-security; urgency=low

  * SECURITY UPDATE: Cookies sent over HTTPS will now be confined to
    HTTPS only (cookie secure flag) and more support for the HTTPOnly
    cookie attribute. Patch taken from upstream release. (LP: #328938)
    - CVE-2008-3663
    - http://www.squirrelmail.org/security/issue/2008-09-28

 -- Andreas Wenning <email address hidden>   Fri, 13 Feb 2009 07:53:14 +0100
Obsolete in gutsy-updates
Obsolete in gutsy-security
squirrelmail (2:1.4.10a-2ubuntu0.1) gutsy-security; urgency=low

  * SECURITY UPDATE: cross site scripting issue in the HTML filter.
    Patch taken from upstream release. (LP: #306536)
    - CVE-2008-2379
    - http://www.squirrelmail.org/security/issue/2008-12-04
  * SECURITY UPDATE: Cookies sent over HTTPS will now be confined to
    HTTPS only (cookie secure flag) and more support for the HTTPOnly
    cookie attribute. Patch taken from upstream release. (LP: #328938)
    - CVE-2008-3663
    - http://www.squirrelmail.org/security/issue/2008-09-28

 -- Andreas Wenning <email address hidden>   Fri, 13 Feb 2009 08:03:02 +0100
Superseded in intrepid-updates
Superseded in intrepid-security
squirrelmail (2:1.4.15-3ubuntu0.1) intrepid-security; urgency=low

  * SECURITY UPDATE: cross site scripting issue in the HTML filter
    (CVE-2008-2379). LP: #306536.
    - functions/mime.php: from the debian package version 1.4.15-4.

 -- Kees Cook <email address hidden>   Mon, 15 Dec 2008 14:33:21 -0800
Superseded in hardy-updates
Superseded in hardy-security
squirrelmail (2:1.4.13-2ubuntu1.1) hardy-security; urgency=low

  * SECURITY UPDATE: cross site scripting issue in the HTML filter
    (CVE-2008-2379). LP: #306536.
    - functiions/mime.php: from the debian package version 1.4.15-4.

 -- Reinhard Tartler <email address hidden>   Tue, 09 Dec 2008 14:58:07 +0100
Superseded in karmic-release
Obsolete in jaunty-release
squirrelmail (2:1.4.15-4) unstable; urgency=high

  * Address cross site scripting issue in the HTML filter
    (CVE-2008-2379).

 -- Ubuntu Archive Auto-Sync <email address hidden>   Wed,  10 Dec 2008 07:13:44 +0000

Available diffs

Superseded in jaunty-release
Obsolete in intrepid-release
squirrelmail (2:1.4.15-3) unstable; urgency=high

  * Cookies sent over HTTPS will now be confined to HTTPS only
    (cookie secure flag) and more support for the HTTPOnly cookie
    attribute. Patch taken from upstream release.
    (CVE-2008-3663, closes: #499942)

Available diffs

Superseded in intrepid-release
squirrelmail (2:1.4.15-1) unstable; urgency=low

  * New upstream bugfix release.
  * Remove Sam Johnston from Uploaders.
  * Update README.locales to be more verbose about which locales
    need to be enabled on the system, thanks Daniel Hahler.
    (closes: #473861)
  * Do not install index.html under /usr/share/doc, it doesn't add
    much value but requires Debian-specific patching which still
    doesn't work well with gzipped files (closes: #457524).

 -- Emanuele Gentili <email address hidden>   Fri,  13 Jun 2008 09:32:28 +0100

Available diffs

Superseded in intrepid-release
Obsolete in hardy-release
squirrelmail (2:1.4.13-2ubuntu1) hardy; urgency=low

  * Sync from Debian (LP: #204754)
  * README.locales: add paragraph about setting up locales for gettext
    (LP: #133845)
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

Superseded in hardy-release
squirrelmail (2:1.4.13-1) unstable; urgency=low

  * New upstream release.

 -- Laurent Bigonville <email address hidden>   Thu,  20 Dec 2007 10:09:03 +0000
Superseded in hardy-release
squirrelmail (2:1.4.12-1) unstable; urgency=low

  * New upstream release.
  * Minor packaging cleanups.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  07 Dec 2007 09:37:28 +0000
Superseded in hardy-release
squirrelmail (2:1.4.11-2) unstable; urgency=low

  * Fix broken attachment handling in PHP4 by applying patch
    from upstream.
    NOTE: this is only a courtesy to PHP4 users, it must be noted
    that Debian does not support PHP4 in current unstable anymore.
    (Closes: #444970)

Obsolete in feisty-backports
squirrelmail (2:1.4.10a-2~feisty1) feisty-backports; urgency=low

  * Automated backport upload; no source changes.

Obsolete in edgy-backports
squirrelmail (2:1.4.10a-2~edgy1) edgy-backports; urgency=low

  * Automated backport upload; no source changes.

Obsolete in dapper-backports
squirrelmail (2:1.4.10a-2~dapper1) dapper-backports; urgency=low

  * Automated backport upload; no source changes.

Superseded in hardy-release
Obsolete in gutsy-release
squirrelmail (2:1.4.10a-2) unstable; urgency=low

  * Make use of new dictionaries-common SquirrelMail interface to
    detect the installed squirrelspell dictionaries (Closes: #420877).
  * Remove obsolete upgrading code.
  * Make sure config files are not closed with '?>' since it's then
    too easy to get stray whitespace at the end of the file.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  01 Jun 2007 09:11:01 +0100
Superseded in dapper-updates
Superseded in dapper-security
squirrelmail (2:1.4.6-1ubuntu0.1) dapper-security; urgency=low

  * SECURITY UPDATE: XSS and CSRF in various areas, local file inclusion,
    variable overwriting.
  * src/compose.php, src/right_main.php, src/login.php, src/mailto.php,
    src/redirect.php, src/webmail.php, src/mime.php: back-ported fixes for
    XSS in compose, draft and HTML mail. (CVE-2006-6142)
    http://www.squirrelmail.org/security/issue/2006-12-02
  * fuctions/mime.php, src/compose.php, src/view_text.php: back-ported fixes
    for XSS in HTML filter (CVE-2007-1262)
    http://www.squirrelmail.org/security/issue/2007-05-09
  * functions/global.php: back-ported fixes for local file inclusion.
    (CVE-2006-2842)
    http://www.squirrelmail.org/security/issue/2006-06-01
  * functions/auth.php, src/compose.php, src/login.php, src/redirect.php,
    src/webmail.php: back-ported fixes for variable overwriting.
    (CVE-2006-4019)
    http://www.squirrelmail.org/security/issue/2006-08-11

 -- Leonel Nunez <email address hidden>   Wed, 16 May 2007 13:02:10 -0600
Obsolete in edgy-updates
Obsolete in edgy-security
squirrelmail (2:1.4.8-1ubuntu0.1) edgy-security; urgency=low

  * SECURITY UPDATE: XSS and CSRF in various areas
  * src/compose.php, src/right_main.php, src/login.php, src/mailto.php,
    src/redirect.php, src/webmail.php, src/mime.php: back-ported fixes for
    XSS in compose, draft and HTML mail. (CVE-2006-6142)
    http://www.squirrelmail.org/security/issue/2006-12-02
  * fuctions/mime.php, src/compose.php, src/view_text.php: back-ported fixes
    for XSS in HTML filter (CVE-2007-1262)
    http://www.squirrelmail.org/security/issue/2007-05-09

 -- Leonel Nunez <email address hidden>   Tue, 15 May 2007 18:49:35 -0600
Obsolete in feisty-updates
Obsolete in feisty-security
squirrelmail (2:1.4.9a-1ubuntu0.1) feisty-security; urgency=low

  * SECURITY UPDATE: CSRF and XSS via HTML filter.
  * functions/mime.php, src/compose.php, src/view_text.php: Patched in-place
    with upstream changes.
  * References
    http://www.squirrelmail.org/security/issue/2007-05-09
    CVE-2007-1262

 -- leonel <email address hidden>   Fri, 11 May 2007 18:39:34 -0600
Superseded in gutsy-release
squirrelmail (2:1.4.10a-1) unstable; urgency=high

  * New upstream security release.
    - Fixes cross site scripting in the HTML filter [CVE-2007-1262]
    - Tweaks SMTP error message display (Closes: #403705).
    - Fixes address duplication on reply-all (Closes: #408242).

 -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  11 May 2007 08:06:52 +0100
Superseded in gutsy-release
Obsolete in feisty-release
squirrelmail (2:1.4.9a-1) unstable; urgency=high

  * New upstream security release.
    - Additionally tightens HTML filter for IE <= 5 parsing
      absolutely everything and it's horse.

Superseded in feisty-release
squirrelmail (2:1.4.8-3) unstable; urgency=low

  * Add note to README.Debian about server side sorting (Closes: #394286)
    and regular_globals not being supported.
  * Add IfModule conditionals for register_globals setting in
    apache.conf (Closes: #398173).

 -- Ubuntu Archive Auto-Sync <email address hidden>   Tue,  14 Nov 2006 01:06:31 +0000
Superseded in feisty-release
squirrelmail (2:1.4.8-2) unstable; urgency=low

  * Update Debian patch to display options to cope with the custom
    charset plugin. Thanks Tomas Kuliavas, Closes: #385300.
  * Suggest php[45]-ldap, Closes: #392306.
  * Improve package description.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Wed,  08 Nov 2006 19:42:38 +0000
Superseded in dapper-backports
squirrelmail (2:1.4.8-1~dapper1) dapper-backports; urgency=low

  * Automated backport upload; no source changes.

 -- John Dong <email address hidden>   Tue, 29 Aug 2006 18:13:38 +0100
Superseded in feisty-release
Obsolete in edgy-release
squirrelmail (2:1.4.8-1) unstable; urgency=high

  * New upstream release
    - Includes security fix: variable overwriting in compose.php
      by logged-in user [CVE-2006-4019]
    - Does not ship SquirrelMail developer's documentation anymore.

  * Remove duplicate content from README.locales.
   

 -- Martin Pitt <email address hidden>   Thu,  17 Aug 2006 16:34:28 +0100
Superseded in edgy-release
squirrelmail (2:1.4.7-1) unstable; urgency=low

  * New upstream bugfix release.
    + Addresses some low-impact, theoretical or disputed security bugs,
      for which the code is tightened just-in-case:
      - Possible local file inclusion (Closes: #373731, CVE-2006-2842)
      - XSS in search.php (Closes: #375782, CVE-2006-3174)
    + Adds note to db-backend.txt about postgreSQL (Closes: #376605).

  * Checked for standards version to 3.7.2, no changes necessary.
  * Update maintainer address.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  06 Jul 2006 03:03:56 +0100
Superseded in edgy-release
Obsolete in dapper-release
squirrelmail (2:1.4.6-1) unstable; urgency=high

  * New upstream release.
  * Includes the following security fixes:
    - Fix IMAP command injection in sqimap_mailbox_select
      with upstream patch. [CVE-2006-0377] (Closes: #354063)
    - Fix possible XSS in MagicHTML, concerning the parsing
      of u\rl and comments in styles. Internet Explorer
      specific. [CVE-2006-0195] (Closes: #354062)
    - Fix possible cross site scripting through the right_main
      parameter of webmail.php. This now uses a whitelist of
      acceptable values. [CVE-2006-0188] (Closes: #354064, #355424)

Superseded in dapper-release
Superseded in dapper-release
squirrelmail (2:1.4.5-2) unstable; urgency=low


  [ Jeroen van Wolffelaar ]
  * Restore squirrelmail-configure manpage, accidently dropped in -1
  * Use debhelper compat level 4

  [ Thijs Kinkhorst ]
  * Drop obsolete symlink for attachment dir.
  * Do not ship upstream README, which contains hardly any information
    relevant to Debian. Extend README.Debian a bit. Thanks W. Borgert.
  * Add years to copyright statement.

 -- Thijs Kinkhorst <email address hidden>  Mon, 15 Aug 2005 21:06:00 +0200
Obsolete in breezy-release
squirrelmail (2:1.4.4-6sarge1) stable-security; urgency=high


  * Non-maintainer upload by the Security Team
  * Corrected the patch based on upstream input
    [src/options_identities.php, CAN-2005-2095]

 -- Martin Schulze <email address hidden>  Mon, 11 Jul 2005 15:21:59 +0000
Obsolete in hoary-security
Superseded in hoary-security
squirrelmail (2:1.4.4-3ubuntu0.1) hoary-security; urgency=high


  * Security patches cross-ported from Debian Sarge.
  * Fix several cross-site scripting vulnerabilities [CAN-2005-1769]
  * Work around arbitrary variable injection with extract() [CAN-2005-2095]

 -- Matthew Palmer <email address hidden>  Sun, 11 Sep 2005 01:11:28 +1000
Obsolete in hoary-release
squirrelmail (2:1.4.4-3) unstable; urgency=low


  * Move default_pref config file from /var to /etc, as per Debian policy
    (Closes: #293281)
  * [JvW] (finally) override two lintian warnings about nonstandard
    permissions that are intentional (Closes: #293366)

 -- Thijs Kinkhorst <email address hidden>  Sun,  6 Feb 2005 21:41:51 +0100
Obsolete in warty-security
Superseded in warty-security
Superseded in warty-security
squirrelmail (1:1.5.0-1ubuntu0.1) warty-security; urgency=low


  * SECURITY UPDATE: decodeHeader HTML Injection Vulnerability
  * functions/mime.php:
    - applied vendor patch.
  * References:
    - CAN-2004-1036
    - http://www.securityfocus.com/bid/11653

 -- Gerardo Di Giacomo <email address hidden>  Sun,  5 Dec 2004 19:40:35 +0000
Obsolete in warty-release
squirrelmail (1:1.5.0-1) unstable; urgency=low


  * New upstream release. Closes #230921.
  * RFC3501 compliance for mailbox naming (eg trailing spaces).
    Closes: #176590, #215183.
  * Adds a squirrelmail symlink in /var/www/. Closes: #229282.
  * Adds PHP safe_mode workaround to README.Debian. Closes: #222071.
  * Adds daily cron job to clean attachments directory. Closes: #228400.
  * Checks for config_default.php before copying in postinst.
    Closes: #229737.

 -- Sam Johnston <email address hidden>  Wed,  4 Feb 2004 01:42:12 +1100
171 of 71 results