Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in MailMan
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in MailMan
ID: DSA-4108-1
Distribution: Debian
Plattformen: Debian jessie, Debian stretch
Datum: Fr, 9. Februar 2018, 14:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950
Applikationen: MailMan

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4108-1 security@debian.org
https://www.debian.org/security/ Thijs Kinkhorst
February 09, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mailman
CVE ID : CVE-2018-5950
Debian Bug : 888201

Calum Hutton and the Mailman team discovered a cross site scripting and
information leak vulnerability in the user options page. A remote
attacker could use a crafted URL to steal cookie information or to
fish for whether a user is subscribed to a list with a private roster.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.18-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 2.1.23-1+deb9u2.

We recommend that you upgrade your mailman packages.

For the detailed security status of mailman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mailman

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org


-----BEGIN PGP SIGNATURE-----

iQEuBAEBCAAYBQJafXf7ERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEs+wH
/0hNhaCYypt3GLdTJkFVGqTlPsTFUxWv8N2vLiWvpAnVunRfapUwIYn4csUd7Wlz
8jIr+UhLoe/8CfX63svA486T8CDRPmkFcj0QpdLMsppJAhzZds7AvZFG6xtyptx8
nIvbePeMxC4eOUVrrjgHKz4EYMX3YCuN/IuYxllCvEaoAM1pUTmE2nd1M43ylxbx
UX3LEJmKVyvV4XLQE38Cvn+nuXsz0rRrgbA3alnugnloM+TffuQpjkAicZbmXRG3
8xEKlnTYZSVPAugyxh72VaPgkeXcpYIqfyuJzGMUi53vE82rAgaMK+kbK87nAa35
ANtjnSGwstSEdEGUGw+jiLM=
=/WgV
-----END PGP SIGNATURE-----
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung