-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4386-1 [email protected] https://www.debian.org/lts/security/ Paride Legovini November 28, 2025 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : sogo Version : 5.0.1-4+deb11u2 CVE ID : CVE-2025-63498 Debian Bug : The SOGo groupware server is vulnerable to Cross Site Scripting (XSS) via the "userName" parameter, allowing arbitrary JavaScript to be executed when a user visits the authentication page. For Debian 11 bullseye, this problem has been fixed in version 5.0.1-4+deb11u2. We recommend that you upgrade your sogo packages. For the detailed security status of sogo please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sogo Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- wsC7BAEBCgBvBYJpKcFTCRDWWGGIPgFNuUcUAAAAAAAeACBzYWx0QG5vdGF0aW9u cy5zZXF1b2lhLXBncC5vcmdlJKVs2b0PdpjsBXuyu9Mo6Ddl4xhKsyR4iOGepU4o sxYhBFYa1YXu12aSG6jdltZYYYg+AU25AAC8zwf/aPBc5XYTaWhssRFcdnndRdDh dm+DcgEtTkS4G8BqnjpRLGPQz/a8Bl2Nvtr+/DZ4J0JTNu4zXnyN+nXncKiIqIhC 5Ru+/WeO/dUggiSr3gBGkxZhx7bkuKD9VuQJ/230K7X3Cs+5R+nFn/g5yA7KfMdu UdDBKm4QhWirIQeQzq8wB1zt/wOLCmQpXoD18x2W/KpazmfGkp/WZTrJt3HxST1M zNg0je7u/zNKfpmavWlfYqioFUsx/THTnSAe3qVah65dod7J6VoRCl2H45NIKwdz SzvaBHl4MtQzvEsoBmBZ5S+VbZxJl7zkQQsecOs0EAFMRgq1sxNOv0d9/Stm8A== =MucK -----END PGP SIGNATURE-----
