ALT-BU-2022-3553-1
Branch sisyphus_e2k update bulletin.
Package mailman updated to version 2.1.39-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-00592
Уязвимость пакета управления рассылками электронных писем GNU Mailman, связанная с недостаточной проверкой источника HTTP-запроса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов
Modified: 2024-11-21
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991
Modified: 2024-11-21
CVE-2021-44227
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Package lxde-common updated to version 0.99.2-alt6 for branch sisyphus_e2k.
Closed bugs
Настройки lxde сбрасываются до дефолтных при каждом логине пользователя.