Debian Linux Security Advisory 4108-1 - Calum Hutton and the Mailman team discovered a cross site scripting and information leak vulnerability in the user options page. A remote attacker could use a crafted URL to steal cookie information or to fish for whether a user is subscribed to a list with a private roster.
9d35d5ad565bca8c1f75bbba0777b61cfc5cb238a65a157dc896ba52dd6acfff
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4108-1 security@debian.org
https://www.debian.org/security/ Thijs Kinkhorst
February 09, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mailman
CVE ID : CVE-2018-5950
Debian Bug : 888201
Calum Hutton and the Mailman team discovered a cross site scripting and
information leak vulnerability in the user options page. A remote
attacker could use a crafted URL to steal cookie information or to
fish for whether a user is subscribed to a list with a private roster.
For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.18-2+deb8u2.
For the stable distribution (stretch), this problem has been fixed in
version 2.1.23-1+deb9u2.
We recommend that you upgrade your mailman packages.
For the detailed security status of mailman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mailman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEuBAEBCAAYBQJafXf7ERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEs+wH
/0hNhaCYypt3GLdTJkFVGqTlPsTFUxWv8N2vLiWvpAnVunRfapUwIYn4csUd7Wlz
8jIr+UhLoe/8CfX63svA486T8CDRPmkFcj0QpdLMsppJAhzZds7AvZFG6xtyptx8
nIvbePeMxC4eOUVrrjgHKz4EYMX3YCuN/IuYxllCvEaoAM1pUTmE2nd1M43ylxbx
UX3LEJmKVyvV4XLQE38Cvn+nuXsz0rRrgbA3alnugnloM+TffuQpjkAicZbmXRG3
8xEKlnTYZSVPAugyxh72VaPgkeXcpYIqfyuJzGMUi53vE82rAgaMK+kbK87nAa35
ANtjnSGwstSEdEGUGw+jiLM=
=/WgV
-----END PGP SIGNATURE-----