---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for mailman SECUNIA ADVISORY ID: SA22227 VERIFY ADVISORY: http://secunia.com/advisories/22227/ CRITICAL: Less critical IMPACT: Cross Site Scripting, Spoofing WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks. For more information: SA21732 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.dsc Size/MD5 checksum: 816 3f2cd37005f340202f0c7660d8c91196 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.diff.gz Size/MD5 checksum: 122128 292c5264aeffbd2079b5a3257b165de0 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz Size/MD5 checksum: 5745912 f5f56f04747cd4aff67427e7a45631af Alpha architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_alpha.deb Size/MD5 checksum: 6612236 6e98b9f63c0eb5168902fb863167a197 AMD64 architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_amd64.deb Size/MD5 checksum: 6611036 3ca3419b399ec2a8a9a398e81d744d07 ARM architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_arm.deb Size/MD5 checksum: 6610764 e2d64ba3fe9dc2883d48cbcfcb016bbe HP Precision architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_hppa.deb Size/MD5 checksum: 6617802 14f8c5db2d8e38c470e3375a7e2102bb Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_i386.deb Size/MD5 checksum: 6606630 112c41dadf9efdf4823ad5c32180fe0e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_ia64.deb Size/MD5 checksum: 6612188 d6a6b7fd9613f4d7a7ac6b59ffff40f9 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_m68k.deb Size/MD5 checksum: 6617856 ebe2b791034f4d08461b2d2c6d60f37d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mips.deb Size/MD5 checksum: 6661270 2412e64f5406bc1e84d3e64fc9e5a9fc Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mipsel.deb Size/MD5 checksum: 6652256 816264d9b311c02fc99d68dd62604cef PowerPC architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_powerpc.deb Size/MD5 checksum: 6618128 6c5974478f4b877ddd47c115d66075f1 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_s390.deb Size/MD5 checksum: 6617184 6977902eb91d3eab34141d0de34f0323 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_sparc.deb Size/MD5 checksum: 6616594 3847454bf1b64d728f7e6bcaf57dea89 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.1.8-3. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1188 OTHER REFERENCES: SA21732: http://secunia.com/advisories/21732/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------