openSUSE Security Update: Security update for mailman
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:2309-1
Rating:             moderate
References:         #1101288 
Cross-References:   CVE-2018-13796
Affected Products:
                    openSUSE Leap 42.3
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for mailman fixes the following issues:

   Security issue fixed:

   - CVE-2018-13796: Fix a content spoofing vulnerability with invalid list
     name messages inside the web UI (boo#1101288).

   Bug fixes:

   - update to 2.1.29:
     * Fixed the listinfo and admin overview pages that were broken

   - update to 2.1.28:
     * It is now possible to edit HTML and text templates via the web admin
       UI in a supported language other than the list's preferred_language.
     * The Japanese translation has been updated
     * The German translation has been updated
     * The Esperanto translation has been updated
     * The BLOCK_SPAMHAUS_LISTED_DBL_SUBSCRIBE feature added in 2.1.27 was
       not working.  This is fixed.
     * Escaping of HTML entities for the web UI is now done more selectively.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-861=1

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2018-861=1



Package List:

   - openSUSE Leap 42.3 (x86_64):

      mailman-2.1.29-2.11.2
      mailman-debuginfo-2.1.29-2.11.2
      mailman-debugsource-2.1.29-2.11.2

   - openSUSE Leap 15.0 (x86_64):

      mailman-2.1.29-lp150.2.8.1
      mailman-debuginfo-2.1.29-lp150.2.8.1
      mailman-debugsource-2.1.29-lp150.2.8.1


References:

   https://www.suse.com/security/cve/CVE-2018-13796.html
   https://bugzilla.suse.com/1101288

-- 

openSUSE: 2018:2309-1: moderate: mailman

August 13, 2018
An update that fixes one vulnerability is now available.

Description

This update for mailman fixes the following issues: Security issue fixed: - CVE-2018-13796: Fix a content spoofing vulnerability with invalid list name messages inside the web UI (boo#1101288). Bug fixes: - update to 2.1.29: * Fixed the listinfo and admin overview pages that were broken - update to 2.1.28: * It is now possible to edit HTML and text templates via the web admin UI in a supported language other than the list's preferred_language. * The Japanese translation has been updated * The German translation has been updated * The Esperanto translation has been updated * The BLOCK_SPAMHAUS_LISTED_DBL_SUBSCRIBE feature added in 2.1.27 was not working. This is fixed. * Escaping of HTML entities for the web UI is now done more selectively.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-861=1 - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-861=1


Package List

- openSUSE Leap 42.3 (x86_64): mailman-2.1.29-2.11.2 mailman-debuginfo-2.1.29-2.11.2 mailman-debugsource-2.1.29-2.11.2 - openSUSE Leap 15.0 (x86_64): mailman-2.1.29-lp150.2.8.1 mailman-debuginfo-2.1.29-lp150.2.8.1 mailman-debugsource-2.1.29-lp150.2.8.1


References

https://www.suse.com/security/cve/CVE-2018-13796.html https://bugzilla.suse.com/1101288--


Severity
Announcement ID: openSUSE-SU-2018:2309-1
Rating: moderate
Affected Products: openSUSE Leap 42.3 openSUSE Leap 15.0

Related News