Lucene search

K
suseSuseOPENSUSE-SU-2021:1452-1
HistoryNov 05, 2021 - 12:00 a.m.

Security update for mailman (important)

2021-11-0500:00:00
lists.opensuse.org
14

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for mailman fixes the following issues:

Update to 2.1.35 to fix 2 security issues:

  • A potential for for a list member to carry out an off-line brute force
    attack to obtain the list admin password has been reported by Andre
    Protas, Richard Cloke and Andy Nuttall of Apple. This is fixed.
    CVE-2021-42096 (boo#1191959, LP:#1947639)

  • A CSRF attack via the user options page could allow takeover of a users
    account. This is fixed. CVE-2021-42097 (boo#1191960, LP:#1947640)

  • make package build reproducible (boo#1047218)

This update was imported from the openSUSE:Leap:15.2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Backports SLE-15-SP2:

    zypper in -t patch openSUSE-2021-1452=1

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C