-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4108-1 security@xxxxxxxxxx https://www.debian.org/security/ Thijs Kinkhorst February 09, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mailman CVE ID : CVE-2018-5950 Debian Bug : 888201 Calum Hutton and the Mailman team discovered a cross site scripting and information leak vulnerability in the user options page. A remote attacker could use a crafted URL to steal cookie information or to fish for whether a user is subscribed to a list with a private roster. For the oldstable distribution (jessie), this problem has been fixed in version 2.1.18-2+deb8u2. For the stable distribution (stretch), this problem has been fixed in version 2.1.23-1+deb9u2. We recommend that you upgrade your mailman packages. For the detailed security status of mailman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mailman Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQEuBAEBCAAYBQJafXf7ERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEs+wH /0hNhaCYypt3GLdTJkFVGqTlPsTFUxWv8N2vLiWvpAnVunRfapUwIYn4csUd7Wlz 8jIr+UhLoe/8CfX63svA486T8CDRPmkFcj0QpdLMsppJAhzZds7AvZFG6xtyptx8 nIvbePeMxC4eOUVrrjgHKz4EYMX3YCuN/IuYxllCvEaoAM1pUTmE2nd1M43ylxbx UX3LEJmKVyvV4XLQE38Cvn+nuXsz0rRrgbA3alnugnloM+TffuQpjkAicZbmXRG3 8xEKlnTYZSVPAugyxh72VaPgkeXcpYIqfyuJzGMUi53vE82rAgaMK+kbK87nAa35 ANtjnSGwstSEdEGUGw+jiLM= =/WgV -----END PGP SIGNATURE-----