lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4501bf86.UyMqdnyKry/Or4yT%announce-noreply@rpath.com>
Date: Fri, 08 Sep 2006 15:07:50 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com,
	update-announce@...ts.rpath.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	lwn@....net
Subject: rPSA-2006-0165-1 mailman

rPath Security Advisory: 2006-0165-1
Published: 2006-09-08
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Remote Deterministic Weakness
Updated Versions:
    mailman=/conary.rpath.com@rpl:devel//1/2.1.6-14.2-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636
    https://issues.rpath.com/browse/RPL-623

Description:
    Previous versions of the mailman package are vulnerable to a
    cross-site-scripting (XSS) attack (CVE-2006-2941) that can allow
    one mailman user to subvert other mailman users' web browsers.
    (Those versions are not vulnerable to CVE-2006-3636, a remote
    Denial of Service attack.)
    
    The upstream mailman project has the relevant security fixes
    only in a new 2.1.9rc1 release that is officially deprecated
    for production use.  After the upstream project releases 2.1.9
    for production use, rPath will update this advisory and release
    the new upstream production version.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ