mailman

Edit Package mailman
No description set
Refresh
Refresh
Source Files
Filename Size Changed
README.SUSE 0000005548 5.42 KB
aliases 0000000127 127 Bytes
logrotate.mailman 0000000747 747 Bytes
mailman-2.1-manpages.tgz 0000007004 6.84 KB
mailman-2.1.14-editarch.patch 0000025933 25.3 KB
mailman-2.1.14-misc-PACKAGES.diff 0000001102 1.08 KB
mailman-2.1.14-python.dif 0000001599 1.56 KB
mailman-2.1.26-list_lists.patch 0000002062 2.01 KB
mailman-2.1.39.tgz 0009508474 9.07 MB
mailman-2.1.39.tgz.sig 0000000095 95 Bytes
mailman-2.1.4-dirmode.patch 0000002809 2.74 KB
mailman-2.1.4-notavaliduser.patch 0000000591 591 Bytes
mailman-2.1.5-no_extra_asian.dif 0000000984 984 Bytes
mailman-apache2.conf 0000001343 1.31 KB
mailman-generate-sysconfig 0000005728 5.59 KB
mailman-rpmlintrc 0000000081 81 Bytes
mailman-update-cfg 0000000436 436 Bytes
mailman-weak-password.diff 0000000679 679 Bytes
mailman-wrapper.patch 0000004484 4.38 KB
mailman.changes 0000039685 38.8 KB
mailman.keyring 0000009961 9.73 KB
mailman.service 0000000581 581 Bytes
mailman.sgidlist 0000000426 426 Bytes
mailman.spec 0000013307 13 KB
mm-text.png 0000000216 216 Bytes
rcmailman 0000004970 4.85 KB
reproducible.patch 0000000577 577 Bytes
sysconfig.mailman 0000002493 2.43 KB
systemd-units.tar.xz 0000001744 1.7 KB
Latest Revision
Bastian Friedrich's avatar Bastian Friedrich (bastianfriedrich) committed (revision 1)
- Update to 2.1.39

- Update to 2.1.37
  - A bug in the fix for CVE-2021-43332 has been fixed.  (LP: #1950833)
  - Fixed a potential XSS attack via the user options page CVE-2021-43331)
  - Fixed a potential for a list moderator to carry out an off-line
    brute force attack to obtain the list admin password
    CVE-2021-43332 (LP: #1949403)

- Update to 2.1.35 to fix 2 security issues: 
  - A potential for for a list member to carry out an off-line brute force
    attack to obtain the list admin password has been reported by Andre
    Protas, Richard Cloke and Andy Nuttall of Apple.  This is fixed.
    CVE-2021-42096  (boo#1191959, LP:#1947639)
 
  - A CSRF attack via the user options page could allow takeover of a users
    account.  This is fixed.  CVE-2021-42097  (boo#1191960, LP:#1947640)

- Update to 2.1.34:
  - The fix for lp#1859104 can result in ValueError being thrown
    on attempts to subscribe to a list. This is fixed and
    extended to apply REFUSE_SECOND_PENDING to unsubscription as
    well. (lp#1878458)
  - DMARC mitigation no longer misses if the domain name returned
    by DNS contains upper case. (lp#1881035)
  - A new WARN_MEMBER_OF_SUBSCRIBE setting can be set to No to
    prevent mailbombing of a member of a list with private
    rosters by repeated subscribe attempts. (lp#1883017)
  - Very long filenames for scrubbed attachments are now
    truncated. (lp#1884456)
Comments 0
openSUSE Build Service is sponsored by