Security update for mailman

SUSE Security Update: Security update for mailman
Announcement ID: SUSE-SU-2019:14068-1
Rating: important
References: #1102416 #997205
Cross-References: CVE-2016-6893
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4-LTSS
  • SUSE Linux Enterprise Point of Sale 11-SP3
  • SUSE Linux Enterprise Debuginfo 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP3

An update that solves one vulnerability and has one errata is now available.

Description:

This update for mailman fixes the following issues:
Security issue fixed:

  • CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:
  • Allow CSRF check to pass in mailman web frontend if the list name contains a "+" (bsc#1102416)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 11-SP4-LTSS:
    zypper in -t patch slessp4-mailman-14068=1
  • SUSE Linux Enterprise Point of Sale 11-SP3:
    zypper in -t patch sleposp3-mailman-14068=1
  • SUSE Linux Enterprise Debuginfo 11-SP4:
    zypper in -t patch dbgsp4-mailman-14068=1
  • SUSE Linux Enterprise Debuginfo 11-SP3:
    zypper in -t patch dbgsp3-mailman-14068=1

Package List:

  • SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):
    • mailman-2.1.15-9.6.12.1
  • SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
    • mailman-2.1.15-9.6.12.1
  • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):
    • mailman-debuginfo-2.1.15-9.6.12.1
    • mailman-debugsource-2.1.15-9.6.12.1
  • SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
    • mailman-debuginfo-2.1.15-9.6.12.1
    • mailman-debugsource-2.1.15-9.6.12.1

References: