USN-8132-1

Source
https://ubuntu.com/security/notices/USN-8132-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8132-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8132-1
Upstream
Related
Published
2026-03-30T21:08:01Z
Modified
2026-03-31T18:16:28.760533Z
Summary
roundcube vulnerabilities
Details

It was discovered that Roundcube Webmail did not properly sanitize certain HTML elements within the e-mail body. An attacker could possibly use this issue to cause a cross-site scripting attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2016-4068, CVE-2016-4069)

It was discovered that Roundcube Webmail did not properly handle certain configuration parameters. An attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2016-9920)

It was discovered that Roundcube Webmail did not properly sanitize CSS styles within SVG documents. An attacker could possibly use this issue to cause a cross-site scripting attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2017-6820)

It was discovered that Roundcube Webmail did not properly restrict exec call in certain drivers of the password plugin. An authenticated user could possibly use this issue to perform arbitrary password resets. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2017-8114)

It was discovered that Roundcube Webmail did not properly set file permissions within the Enigma plugin. An attacker could possibly use this issue to exfiltrate GPG private keys via network connectivity. (CVE-2018-1000071)

It was discovered that Roundcube Webmail did not properly handle GnuPG MDC integrity-protection warnings. An attacker could possibly use this issue to obtain sensitive information from encrypted communications. (CVE-2018-19205)

It was discovered that Roundcube Webmail did not properly sanitize <svg> and <style> tags within HTML attachments. An attacker could possibly use this issue to cause a cross-site scripting attack. (CVE-2018-19206)

It was discovered that Roundcube Webmail did not properly handle partially encrypted multipart messages. An attacker could possibly use this issue to cause leaking of the plaintext of encrypted messages via an email reply. (CVE-2019-10740)

It was discovered that Roundcube Webmail did not properly sanitize a certain parameter within the archive plugin. An attacker could possibly use this issue to perform an IMAP injection attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2018-9846)

References

Affected packages

Ubuntu:Pro:16.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1+esm7?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2~beta+dfsg.1-0ubuntu1+esm7

Affected versions

1.*
1.1.1+dfsg.1-2
1.1.2+dfsg.1-5
1.1.3+dfsg.1-1
1.1.4+dfsg.1-1
1.2~beta+dfsg.1-0ubuntu1
1.2~beta+dfsg.1-0ubuntu1+esm1
1.2~beta+dfsg.1-0ubuntu1+esm2
1.2~beta+dfsg.1-0ubuntu1+esm3
1.2~beta+dfsg.1-0ubuntu1+esm4
1.2~beta+dfsg.1-0ubuntu1+esm5
1.2~beta+dfsg.1-0ubuntu1+esm6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2016-4068"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2016-4069"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2016-9920"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2017-6820"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2017-8114"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-9846"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-19205"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-19206"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-1000071"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2019-10740"
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8132-1.json"

Ubuntu:Pro:18.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1ubuntu0.1~esm7?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.6+dfsg.1-1ubuntu0.1~esm7

Affected versions

1.*
1.3.0+dfsg.1-1
1.3.1+dfsg.1-1
1.3.3+dfsg.1-1
1.3.3+dfsg.1-2
1.3.6+dfsg.1-1
1.3.6+dfsg.1-1ubuntu0.1~esm1
1.3.6+dfsg.1-1ubuntu0.1~esm2
1.3.6+dfsg.1-1ubuntu0.1~esm3
1.3.6+dfsg.1-1ubuntu0.1~esm4
1.3.6+dfsg.1-1ubuntu0.1~esm5
1.3.6+dfsg.1-1ubuntu0.1~esm6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm7"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-19205"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-19206"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2018-1000071"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2019-10740"
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8132-1.json"