File _patchinfo of Package patchinfo.24378
<patchinfo incident="24378"> <issue tracker="bnc" id="1192735">VUL-0: CVE-2021-43331: mailman: XSS in Cgi/options.py</issue> <issue tracker="bnc" id="1192741">VUL-0: CVE-2021-43332: mailman: a list moderator can crack the list admin password encrypted in a CSRF token</issue> <issue tracker="bnc" id="1191959">VUL-0: CVE-2021-42096: mailman: remote privilege escalation in GNU Mailman before 2.1.35 via csrf_token derived from admin password</issue> <issue tracker="bnc" id="1193316">VUL-0: CVE-2021-44227: mailman: In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request</issue> <issue tracker="cve" id="2021-43331"/> <issue tracker="cve" id="2021-42096"/> <issue tracker="cve" id="2021-43332"/> <issue tracker="cve" id="2021-44227"/> <packager>mcepl</packager> <rating>important</rating> <category>security</category> <summary>Security update for mailman</summary> <description>This update for mailman fixes the following issues: - CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316). - CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741). - CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735). - CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959). </description> </patchinfo>