SUSE-SU-2018:4296-1: important: Security update for mailman

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Dec 28 16:10:17 MST 2018


   SUSE Security Update: Security update for mailman
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:4296-1
Rating:             important
References:         #1077358 #1099510 #1101288 #925502 #995352 
                    
Cross-References:   CVE-2015-2775 CVE-2016-6893 CVE-2018-0618
                    CVE-2018-13796 CVE-2018-5950
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server for SAP 12-SP1
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP1-LTSS
                    SUSE Linux Enterprise Server 12-LTSS
                    SUSE Enterprise Storage 4
______________________________________________________________________________

   An update that fixes 5 vulnerabilities is now available.

Description:

   This update for mailman fixes the following security vulnerabilities:

   - Fixed a XSS vulnerability and information leak in user options CGI,
     which could be used to execute arbitrary scripts in the user's browser
     via specially encoded URLs (bsc#1077358 CVE-2018-5950)
   - Fixed a directory traversal vulnerability in MTA transports when using
     the recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
   - Fixed a XSS vulnerability, which allowed malicious listowners to inject
     scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
   - Fixed arbitrary text injection vulnerability in several mailman CGIs
     (CVE-2018-13796 bsc#1101288)
   - Fixed a CSRF vulnerability on the user options page (CVE-2016-6893
     bsc#995352)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2018-3062=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-3062=1

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-3062=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-3062=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-3062=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-3062=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-3062=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-3062=1

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2018-3062=1

   - SUSE Enterprise Storage 4:

      zypper in -t patch SUSE-Storage-4-2018-3062=1



Package List:

   - SUSE OpenStack Cloud 7 (s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-SP4 (ppc64le s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-SP3 (ppc64le s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3

   - SUSE Enterprise Storage 4 (x86_64):

      mailman-2.1.17-3.3.3
      mailman-debuginfo-2.1.17-3.3.3
      mailman-debugsource-2.1.17-3.3.3


References:

   https://www.suse.com/security/cve/CVE-2015-2775.html
   https://www.suse.com/security/cve/CVE-2016-6893.html
   https://www.suse.com/security/cve/CVE-2018-0618.html
   https://www.suse.com/security/cve/CVE-2018-13796.html
   https://www.suse.com/security/cve/CVE-2018-5950.html
   https://bugzilla.suse.com/1077358
   https://bugzilla.suse.com/1099510
   https://bugzilla.suse.com/1101288
   https://bugzilla.suse.com/925502
   https://bugzilla.suse.com/995352



More information about the sle-updates mailing list