<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

  <title>Roundcube Webmail Project News</title>
  <link href="https://roundcube.net/feeds/atom.xml" rel="self" />
  <link href="https://roundcube.net" />
  <updated>2018-11-26T12:47:51+00:00</updated>
  <id>https://roundcube.net</id>
  <author>
    <name>Roundcube Webmail Dev Team</name>
  </author>

  
  <entry>
    <title>Update 1.3.8 released</title>
    <link href="https://roundcube.net/news/2018/10/26/update-1.3.8-released" />
    <updated>2018-10-26T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/10/26/update-1.3.8-released</id>
    <content type="html">&lt;p&gt;We proudly announce the next service release to update the stable version 1.3.&lt;/p&gt;

&lt;p&gt;It contains fixes to several bugs backported from the master branch including
a security fix for a reported XSS vulnerability plus updates to ensure compatibility
with PHP 7.3 and recent versions of Courier-IMAP, Dovecot and MySQL 8.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.8&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This release is considered stable and we recommend to update all productive installations 
of Roundcube with this version. Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please do backup your data before updating!&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Roundcube 1.4 beta released</title>
    <link href="https://roundcube.net/news/2018/08/25/roundcube-1.4-beta-released" />
    <updated>2018-08-25T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/08/25/roundcube-1.4-beta-released</id>
    <content type="html">&lt;p&gt;We proudly announce the beta release of the next major version 1.4 of Roundcube webmail.
With this milestone we introduce some new features:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;New responsive skin with mobile support&lt;/li&gt;
  &lt;li&gt;Email Resent (Bounce) feature&lt;/li&gt;
  &lt;li&gt;Improved Mailvelope integration&lt;/li&gt;
  &lt;li&gt;Support for Redis cache&lt;/li&gt;
  &lt;li&gt;Support for SMTPUTF8&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Because the new responsive skin is not yet fully completed, it’s not enabled
by default. In order to make it the default for your users, change your
&lt;code class=&quot;highlighter-rouge&quot;&gt;config.inc.php&lt;/code&gt; accordingly:&lt;/p&gt;

&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;$config['skin'] = 'elastic';
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Although it still needs some polishing, the new skin solves the urgent need
to enable access to Roundcube for mobile devices. The plugin &lt;a href=&quot;https://plugins.roundcube.net/packages/roundcube/elastic4mobile&quot;&gt;elastic4mobile&lt;/a&gt;
makes it the default for mobile devices while keeping the configured default
for desktop browsers.&lt;/p&gt;

&lt;p&gt;The Elastic skin is built with LESS and of course the sources are included.
They allow a certain degree of customization by adjusting some color &lt;a href=&quot;https://github.com/roundcube/roundcubemail/blob/master/skins/elastic/styles/colors.less&quot;&gt;variables&lt;/a&gt;.
All you need is to compile your very own customized skin with &lt;code class=&quot;highlighter-rouge&quot;&gt;lessc&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.4-beta&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This is a beta release and we recommend to test it on a separate environment.
And don’t forget to backup your data before installing it.
Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Update 1.3.7 released</title>
    <link href="https://roundcube.net/news/2018/07/27/update-1.3.7-released" />
    <updated>2018-07-27T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/07/27/update-1.3.7-released</id>
    <content type="html">&lt;p&gt;We proudly announce the next service release to update the stable version 1.3.
It contains fixes to several bugs backported from the master branch including
a security fix mitigating the EFAIL issue recently discovered in OpenPGP.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.7&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This release is considered stable and we recommend to update all productive installations 
of Roundcube with this version. Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please do backup your data before updating!&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Updates 1.2.9 and 1.1.12 released</title>
    <link href="https://roundcube.net/news/2018/04/29/updates-1.2.9-1.1.12-released" />
    <updated>2018-04-29T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/04/29/updates-1.2.9-1.1.12-released</id>
    <content type="html">&lt;p&gt;As a follow-up to the recent security update for the stable versions 1.2. and 1.1, this new release fixes a regression that sneaked in with the IMAP command injection protection which unintentionally disabled actions that operate on all selected messages (e.g. mark all as junk).&lt;/p&gt;

&lt;p&gt;We recommend to update all productive installations of Roundcube 1.2.8. and 1.1.11 with these new versions.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.2.9&quot;&gt;release 1.2.9&lt;/a&gt;.&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.1.12&quot;&gt;release 1.1.12&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
</content>
  </entry>
  
  <entry>
    <title>Security updates 1.2.8 and 1.1.11 released</title>
    <link href="https://roundcube.net/news/2018/04/17/security-updates-1.2.8-1.1.11" />
    <updated>2018-04-17T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/04/17/security-updates-1.2.8-1.1.11</id>
    <content type="html">&lt;p&gt;Following the &lt;a href=&quot;/news/2018/04/11/security-update-1.3.6&quot;&gt;recent security update for 1.3&lt;/a&gt;,
here now come the promised updates for the LTS versions 1.2 and 1.1. They both fix the 
recently reported vulnerability allowing IMAP command injection via a GET parameters.
More details about this are published under &lt;code class=&quot;highlighter-rouge&quot;&gt;CVE-2018-9846&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Another fix included in these updates is about a missed remote content blocking
on HTML messages with specially crafted image and style tags.&lt;/p&gt;

&lt;p&gt;See the full changelog in the release notes on the according Github download pages:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.2.8&quot;&gt;release 1.2.8&lt;/a&gt;.&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.1.11&quot;&gt;release 1.1.11&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We strongly recommend to update all productive installations of Roundcube 1.2.x and 1.1.x respectively.
Please do backup your data before updating!&lt;/p&gt;

&lt;h1 id=&quot;update&quot;&gt;UPDATE&lt;/h1&gt;

&lt;p&gt;An unintended regression was added with the fix for the IMAP command injection vulnerability which &lt;a href=&quot;/news/2018/04/29/updates-1.2.9-1.1.12-released&quot;&gt;has also been fixed&lt;/a&gt; now. We therefore recommend to update to versions &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.2.9&quot;&gt;1.2.9&lt;/a&gt; and &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.1.12&quot;&gt;1.1.11&lt;/a&gt; right away.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Security update 1.3.6 released</title>
    <link href="https://roundcube.net/news/2018/04/11/security-update-1.3.6" />
    <updated>2018-04-11T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/04/11/security-update-1.3.6</id>
    <content type="html">&lt;p&gt;We just published a security update to the stable version 1.3. It primarily fixes a recently
discovered IMAP command injection vulnerability caused by insufficient input 
validation within the archive plugin. Details about the vulnerability
are published under &lt;code class=&quot;highlighter-rouge&quot;&gt;CVE-2018-9846&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Additionally, we back-ported some minor fixes from the master branch which
improve PHP 7.2 compatibility as well as PGP signing and key handling for
those who use the Enigma plugin.&lt;/p&gt;

&lt;p&gt;See the full changelog in the release notes on the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.6&quot;&gt;Github download page&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We strongly recommend to update all productive installations of Roundcube
with this new version. Updates for older LTS versions will follow soon.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Update 1.3.5 released</title>
    <link href="https://roundcube.net/news/2018/03/15/update-1.3.5-released" />
    <updated>2018-03-15T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/03/15/update-1.3.5-released</id>
    <content type="html">&lt;p&gt;We proudly announce a new service release to update the stable version 1.3.
It contains fixes to several bugs backported from the master branch. One can be
called a minor security fix as it fixes blocking of remote content on specially 
crafted style tags.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.5&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This release is considered stable and we recommend to update all productive installations 
of Roundcube with this version. Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please do backup your data before updating!&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Update 1.3.4 released</title>
    <link href="https://roundcube.net/news/2018/01/14/update-1.3.4-released" />
    <updated>2018-01-14T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2018/01/14/update-1.3.4-released</id>
    <content type="html">&lt;p&gt;We proudly announce the next service release to update the stable version 1.3.
It contains fixes to several bugs reported by our dear community members and
makes Roundcube fully compatible with PHP 7.2.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.4&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This release is considered stable and we recommend to update all productive installations 
of Roundcube with this version. Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please do backup your data before updating!&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Security updates 1.3.3, 1.2.7 and 1.1.10 released</title>
    <link href="https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10" />
    <updated>2017-11-08T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10</id>
    <content type="html">&lt;p&gt;We just published updates to all stable versions from 1.1.x onwards delivering 
fixes for a recently discovered file disclosure vulnerability in Roundcube Webmail.&lt;/p&gt;

&lt;p&gt;Apparently this zero-day exploit is already being used by hackers to read
Roundcube’s configuration files. It requires a valid username/password as the
exploit only works with a valid session. More details will be published soon under
&lt;code class=&quot;highlighter-rouge&quot;&gt;CVE-2017-16651&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The Roundcube series 1.0.x is not affected by this vulnerability but we nevertheless
back-ported the fix in order to protect from yet unknown exploits.&lt;/p&gt;

&lt;p&gt;See the full changelog for the according version in the release notes on the Github
download pages:
&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.3&quot;&gt;v1.3.3&lt;/a&gt;,
&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.2.7&quot;&gt;v1.2.7&lt;/a&gt;,
&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.1.10&quot;&gt;v1.1.10&lt;/a&gt;
&lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.0.12&quot;&gt;v1.0.12&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We strongly recommend to update all productive installations of Roundcube
with either one of these versions.&lt;/p&gt;

&lt;h2 id=&quot;mitigation&quot;&gt;Mitigation&lt;/h2&gt;

&lt;p&gt;In order to check whether your Roundcube installation has been compromised
check the access logs for requests like &lt;code class=&quot;highlighter-rouge&quot;&gt;?_task=settings&amp;amp;_action=upload-display&amp;amp;_from=timezone&lt;/code&gt;.
As mentioned above, the file disclosure only works for authenticated users and
by finding such requests in the logs you should also be able to identify the
account used for this unauthorized access. For mitigation we recommend to change
the all credentials to external services like database or LDAP address books
and preferably also the &lt;code class=&quot;highlighter-rouge&quot;&gt;des_key&lt;/code&gt; option in your config.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Update 1.3.2 released</title>
    <link href="https://roundcube.net/news/2017/10/31/update-1.3.2-released" />
    <updated>2017-10-31T00:00:00+00:00</updated>
    <id>https://roundcube.net/news/2017/10/31/update-1.3.2-released</id>
    <content type="html">&lt;p&gt;We proudly announce the second service release to update the stable version 1.3.
It contains fixes to several bugs reported by our dear community members
as well as translation updates synchronized from &lt;a href=&quot;https://www.transifex.com/roundcube/roundcube-webmail/&quot;&gt;Transifex&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We also changed the wording for the setting that controls the time after which
an opened message is marked as read. This was previously only affecting messages
being viewed in the preview panel but now applies to all means of opening
a message. That change came with 1.3.0 an apparently confused many users.
Some translation work is still needed here.&lt;/p&gt;

&lt;p&gt;See the full changelog in the &lt;a href=&quot;https://github.com/roundcube/roundcubemail/releases/tag/1.3.2&quot;&gt;release notes&lt;/a&gt;
on the Github download page.&lt;/p&gt;

&lt;p&gt;This release is considered stable and we recommend to update all productive installations 
of Roundcube with this version. Download it from &lt;a href=&quot;https://roundcube.net/download&quot;&gt;roundcube.net&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please do backup your data before updating!&lt;/p&gt;
</content>
  </entry>
  

</feed>
