[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4501bf86.UyMqdnyKry/Or4yT%announce-noreply@rpath.com>
Date: Fri, 08 Sep 2006 15:07:50 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0165-1 mailman
rPath Security Advisory: 2006-0165-1
Published: 2006-09-08
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Weakness
Updated Versions:
mailman=/conary.rpath.com@rpl:devel//1/2.1.6-14.2-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636
https://issues.rpath.com/browse/RPL-623
Description:
Previous versions of the mailman package are vulnerable to a
cross-site-scripting (XSS) attack (CVE-2006-2941) that can allow
one mailman user to subvert other mailman users' web browsers.
(Those versions are not vulnerable to CVE-2006-3636, a remote
Denial of Service attack.)
The upstream mailman project has the relevant security fixes
only in a new 2.1.9rc1 release that is officially deprecated
for production use. After the upstream project releases 2.1.9
for production use, rPath will update this advisory and release
the new upstream production version.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists