-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 16 Feb 2011 21:02:42 +0100 Source: mailman Binary: mailman Architecture: i386 Version: 1:2.1.11-11+lenny2 Distribution: lenny-security Urgency: high Maintainer: i386 Build Daemon Changed-By: Thijs Kinkhorst Description: mailman - Powerful, web-based mailing list manager Closes: 599833 Changes: mailman (1:2.1.11-11+lenny2) oldstable-security; urgency=high . * Upload to lenny-security. * CVE-2010-3089: cross-site scripting (XSS) vulnerabilities which can be exploited by list administrators (Closes: 599833). * CVE-2011-0707: Cross site scripting in subscriber names. Checksums-Sha1: acaeed1175500f9b66e85893f088f9ad269e4180 9540058 mailman_2.1.11-11+lenny2_i386.deb Checksums-Sha256: 9b6ac076b20c22e995af4f1cf0900d760fe89a3f5173413a9aded0d580c06888 9540058 mailman_2.1.11-11+lenny2_i386.deb Files: 765f5a25c63b19e9f672979a9f1eddf7 9540058 mail optional mailman_2.1.11-11+lenny2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJNXEKwAAoJEOxfUAG2iX57LfwIAMngAYeUfFVC0FtLymIug75I OWbUJSLu3x0owhuVftwre1jNO69/xnN0czcLgIrEvFYVzs2elmoYW+ZsfiyMa5QT teHzgdJD1q0UZLluSprmO2iiZhML+/vqRBHhVBKnwln6yLd7/xC3SfpOHBBLc32L q/p2P5hK6j6BRRNEALWQbmApam8K3ZwlWzxROfMBOtJJFtK1/eJNlGX0zkCPxk4/ YjrqFplEqwK6W3TV5Pcv1ojzC3ZKVs28d7F05mYr3xatA2pQ5Y0z49C+KVQSSqgY Gnwa8gs6D5yA1MBKoG7sbQcYX5kMJaDX2j0ZvQzKqUZ4+sZ3R2PDSRK/5zAs7e8= =xTJ+ -----END PGP SIGNATURE-----