Debian Linux Security Advisory 4991-1 - Several vulnerabilities were discovered in mailman, a web-based mailing list manager, which could result in arbitrary content injection via the options and private archive login pages, and CSRF attacks or privilege escalation via the user options page.
954d8b9822764173dd884577e87a44ad7f9a8af40f4ebc025e3d191931336710
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4991-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 22, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mailman
CVE ID : CVE-2020-12108 CVE-2020-15011 CVE-2021-42096 CVE-2021-42097
Several vulnerabilities were discovered in mailman, a web-based mailing
list manager, which could result in arbitrary content injection via the
options and private archive login pages, and CSRF attacks or privilege
escalation via the user options page.
For the oldstable distribution (buster), these problems have been fixed
in version 1:2.1.29-1+deb10u2.
We recommend that you upgrade your mailman packages.
For the detailed security status of mailman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/mailman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=yfra
-----END PGP SIGNATURE-----