mailman:2.1 security update

エラータID: AXSA:2022-2976:01

Release date: 
Tuesday, January 18, 2022 - 12:03
Subject: 
mailman:2.1 security update
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

Mailman is a program used to help manage e-mail discussion lists.

Security Fix(es):

* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097)
* mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-42096
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

Modularity name: mailman
Stream name: 2.1

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. mailman-2.1.29-12.module+el8+1369+eec2fb9e.1.src.rpm
    MD5: 9d8616b357b03a622bae4614cf537581
    SHA-256: 007f9782e342fdfaa9bd3e4a819b0ba652829f35fedd75cb6796115d8a1cdb2e
    Size: 9.02 MB

Asianux Server 8 for x86_64
  1. mailman-2.1.29-12.module+el8+1369+eec2fb9e.1.x86_64.rpm
    MD5: a1066352b2ee5eb04dc8bd50315a9ddd
    SHA-256: 6abb17f65b8318eba14921a34e1f0582367d95cb558e9279e3b63be3ddcbc6a5
    Size: 5.99 MB
  2. mailman-debugsource-2.1.29-12.module+el8+1369+eec2fb9e.1.x86_64.rpm
    MD5: 8e2c64f55adc24f9438b9eb9285dff26
    SHA-256: 1d5b7f3f7a23c6aef4a3f2b902549d4dcdaf4b0813c383beb54e8bc90797ec84
    Size: 37.17 kB