Security update for mailman
Announcement ID: | SUSE-SU-2019:13924-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for mailman fixes the following issues:
- Fixed a XSS vulnerability and information leak in user options CGI, which could be used to execute arbitrary scripts in the user's browser via specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-mailman-13924=1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3
zypper in -t patch slessp3-mailman-13924=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-mailman-13924=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-mailman-13924=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- mailman-2.1.15-9.6.6.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64 i586)
- mailman-2.1.15-9.6.6.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- mailman-2.1.15-9.6.6.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- mailman-2.1.15-9.6.6.1
References:
- https://www.suse.com/security/cve/CVE-2015-2775.html
- https://www.suse.com/security/cve/CVE-2016-6893.html
- https://www.suse.com/security/cve/CVE-2018-0618.html
- https://www.suse.com/security/cve/CVE-2018-13796.html
- https://www.suse.com/security/cve/CVE-2018-5950.html
- https://bugzilla.suse.com/show_bug.cgi?id=1077358
- https://bugzilla.suse.com/show_bug.cgi?id=1099510
- https://bugzilla.suse.com/show_bug.cgi?id=1101288
- https://bugzilla.suse.com/show_bug.cgi?id=925502
- https://bugzilla.suse.com/show_bug.cgi?id=995352