-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 16 Feb 2011 21:02:42 +0100 Source: mailman Binary: mailman Architecture: sparc Version: 1:2.1.11-11+lenny2 Distribution: lenny-security Urgency: high Maintainer: sparc Build Daemon (spontini) Changed-By: Thijs Kinkhorst Description: mailman - Powerful, web-based mailing list manager Closes: 599833 Changes: mailman (1:2.1.11-11+lenny2) oldstable-security; urgency=high . * Upload to lenny-security. * CVE-2010-3089: cross-site scripting (XSS) vulnerabilities which can be exploited by list administrators (Closes: 599833). * CVE-2011-0707: Cross site scripting in subscriber names. Checksums-Sha1: 35ecf3306456b1bedce82784cd18a589910b5a07 9566084 mailman_2.1.11-11+lenny2_sparc.deb Checksums-Sha256: bdcadcf9a6af6188c27ecc9812b62a050efab732a6d050f64c6b91f259efc26b 9566084 mailman_2.1.11-11+lenny2_sparc.deb Files: 2a4ae155ae3eb897bfc491871d0a56a8 9566084 mail optional mailman_2.1.11-11+lenny2_sparc.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJNXEKvAAoJEOxfUAG2iX57SfcH/0+KI5E+QjAIkCdNOyGTpei/ 3CdFFCq31eFxmsq16g0sTn77xSaMfTasSjQeWSyeGiGM/7zNfKMB9Rk2HN6VmkzW lhhNNgkDk1MPNr6ZRDCbJ40XqHn26OIAFIDKnEL8zrS62aHRzXA/aiEQOcKnc+rm 1egFfGIFRe3OaF9Fpa0G1aivy3Tsj9R/9Ilofo5g3N6Z/Uwxb0MD6waWanzJiHqU fwOJ1/6RXFlS6WwBd3QUypGhFJbD2CRDjKgeQUdvxyIqVs98IDiVcjhRQdFBgBue 06O+mB4pNaHbuIFyItxAK0iKH3ElvKPpVweePG1dvE3gRWnzwcUvlzfcDuuaTBs= =jaMg -----END PGP SIGNATURE-----