-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 16 Feb 2011 21:02:42 +0100 Source: mailman Binary: mailman Architecture: s390 Version: 1:2.1.11-11+lenny2 Distribution: lenny-security Urgency: high Maintainer: s390 Build Daemon (zandonai) Changed-By: Thijs Kinkhorst Description: mailman - Powerful, web-based mailing list manager Closes: 599833 Changes: mailman (1:2.1.11-11+lenny2) oldstable-security; urgency=high . * Upload to lenny-security. * CVE-2010-3089: cross-site scripting (XSS) vulnerabilities which can be exploited by list administrators (Closes: 599833). * CVE-2011-0707: Cross site scripting in subscriber names. Checksums-Sha1: b4f4a1a8f1ba1cd184836bb045238e66dfc49c0b 9534510 mailman_2.1.11-11+lenny2_s390.deb Checksums-Sha256: 594ddc5918e920961405f31e004a32292c22418a7f85403811e8be57631abb60 9534510 mailman_2.1.11-11+lenny2_s390.deb Files: ff449e4a369f12df61cec2f507940011 9534510 mail optional mailman_2.1.11-11+lenny2_s390.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJNXEKwAAoJEOxfUAG2iX57c0sIAMx1ZuOVpTUwh+Do95+RnM9a UjDjv0dMZUaEv3Q2C0wx12hUkw2/aiSjpeigWc8c7DqhMZJIU56m9lke2K0dxo6n EXOM35JrkHDsgXt9wYIVdYUPq2TpLLMg/LKogkqjVBhItt/GXzqey8WJyDiCtEVJ Lm2VDERSi2l6sezfL8vuJT3OxzRrnyzTjnRYcxBhfEzE7rs9evC1XQN4vpYlKKy/ +ItKj3tDXwkGWQKbbPpUhB0J7/pFuFw+dAS1vCA0r0AAj6IdApv+BH4U0lzKZrR/ L324JgdvBYawCdx+c92EuKC+g8PqHCuOGA7c3plQ4Uc3/dxqhbcZAS1l7p/xgkE= =0ha4 -----END PGP SIGNATURE-----