-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 16 Feb 2011 21:02:42 +0100 Source: mailman Binary: mailman Architecture: ia64 Version: 1:2.1.11-11+lenny2 Distribution: lenny-security Urgency: high Maintainer: ia64 Build Daemon (mundy) Changed-By: Thijs Kinkhorst Description: mailman - Powerful, web-based mailing list manager Closes: 599833 Changes: mailman (1:2.1.11-11+lenny2) oldstable-security; urgency=high . * Upload to lenny-security. * CVE-2010-3089: cross-site scripting (XSS) vulnerabilities which can be exploited by list administrators (Closes: 599833). * CVE-2011-0707: Cross site scripting in subscriber names. Checksums-Sha1: 71bcce692a338e80c25fd7f3dc669c08dc62af1a 9525528 mailman_2.1.11-11+lenny2_ia64.deb Checksums-Sha256: 13f7e1edd060d2a68ecc4f6975fff6b029d14fc2ba792cf12b7422192bcb9287 9525528 mailman_2.1.11-11+lenny2_ia64.deb Files: 95d46b01126e228b8faa8d21853a17fe 9525528 mail optional mailman_2.1.11-11+lenny2_ia64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJNXEKwAAoJEOxfUAG2iX57wHQIAKxt2bv/FiPFY6k/0CwEStoQ CvuMJjcrHwGOPEiF3B6bqgNMKZU+2H1wJIzK7nXCzhlkc+H2S0/NtYmYkSE4t50r sBDFqX4YVSpbhDlSnUnH+CaABMGu1pgCbpFhR0KDLY0g8Wf8uSEgOYfayKV09BtZ /pKpYpQ1e/9rmAe18J7pTLJ0LX0zBLiwvJ3lHV6snRUXoR5N9PGVDacL3klydaJh sQKB/yWH0LkL9tnS2lJjcICD8M8yHhCbCr1Jk59u1Jy47qRD2b7vUBuOTyTfxdjt 9+k6uqAs1xN69GzJVXM5df3utIIj0Zt+dhimNtTz9c/w7lfxuF6ooj/895kgPl0= =Qgeg -----END PGP SIGNATURE-----