[<prev] [next>] [day] [month] [year] [list]
Message-ID: <6d849d42-c317-f9a1-21cc-960f01733bb3@debian.org>
Date: Fri, 9 Feb 2018 11:29:18 +0100
From: Thijs Kinkhorst <thijs@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4108-1] mailman security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4108-1 security@...ian.org
https://www.debian.org/security/ Thijs Kinkhorst
February 09, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mailman
CVE ID : CVE-2018-5950
Debian Bug : 888201
Calum Hutton and the Mailman team discovered a cross site scripting and
information leak vulnerability in the user options page. A remote
attacker could use a crafted URL to steal cookie information or to
fish for whether a user is subscribed to a list with a private roster.
For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.18-2+deb8u2.
For the stable distribution (stretch), this problem has been fixed in
version 2.1.23-1+deb9u2.
We recommend that you upgrade your mailman packages.
For the detailed security status of mailman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mailman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
iQEuBAEBCAAYBQJafXf7ERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEs+wH
/0hNhaCYypt3GLdTJkFVGqTlPsTFUxWv8N2vLiWvpAnVunRfapUwIYn4csUd7Wlz
8jIr+UhLoe/8CfX63svA486T8CDRPmkFcj0QpdLMsppJAhzZds7AvZFG6xtyptx8
nIvbePeMxC4eOUVrrjgHKz4EYMX3YCuN/IuYxllCvEaoAM1pUTmE2nd1M43ylxbx
UX3LEJmKVyvV4XLQE38Cvn+nuXsz0rRrgbA3alnugnloM+TffuQpjkAicZbmXRG3
8xEKlnTYZSVPAugyxh72VaPgkeXcpYIqfyuJzGMUi53vE82rAgaMK+kbK87nAa35
ANtjnSGwstSEdEGUGw+jiLM=
=/WgV
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists