-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 16 Feb 2011 21:02:42 +0100 Source: mailman Binary: mailman Architecture: mipsel Version: 1:2.1.11-11+lenny2 Distribution: lenny-security Urgency: high Maintainer: mipsel Build Daemon (mayer) Changed-By: Thijs Kinkhorst Description: mailman - Powerful, web-based mailing list manager Closes: 599833 Changes: mailman (1:2.1.11-11+lenny2) oldstable-security; urgency=high . * Upload to lenny-security. * CVE-2010-3089: cross-site scripting (XSS) vulnerabilities which can be exploited by list administrators (Closes: 599833). * CVE-2011-0707: Cross site scripting in subscriber names. Checksums-Sha1: 80b44e3fe9ff3466bb9c9235a0759c4ef90eff7f 9515194 mailman_2.1.11-11+lenny2_mipsel.deb Checksums-Sha256: 3812bf3905bedf6ab07e210b5851994dc345fdee1632bc13e13cf46c42c7d53d 9515194 mailman_2.1.11-11+lenny2_mipsel.deb Files: be87fcd560cbbbce74020995fbdc9042 9515194 mail optional mailman_2.1.11-11+lenny2_mipsel.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJNXFbPAAoJEOxfUAG2iX579nYH/35skVB4D5uuicT5SjsEjYhc Ez62ua/RqeqXQoDrP5unGkFnab1n1UpXpAkxzNvQwv2rMqeV3gcRJ2JLQGuwLK2b UZyUf2153Hps1wqE9PfLOmtOxeBP/Og9QceQjEQNkihRlYw7RNoeIFitvXOspPFU j6EDcG+/INXtCZxYGzQoJRc0xfVTgaj8BbsxRyjeJsIt0p9gSJ10dPrKzb+6AjVe 2ArnF9791VT0fijqlwc2ZEZoFUZuSM0NyAMmAyMx/vPKuWLGowTJKlUvZHrb85uY rvnAX3WvmIO0usCPh9j5T1Zh1yxF4e4GkB6fDjBN3BxGbYSHxby/Wu8LJKyRfsI= =fXfq -----END PGP SIGNATURE-----