Package mailman: Information

    Source package: mailman
    Version: 2.1.37-alt1
    Build time:  Nov 19, 2021, 02:37 PM in the task #289143
    Category: System/Servers
    Report package bug
    Summary: Mailing list manager with built in web access
    Description: 
    Mailman, the GNU Mailing List Management System, is a mailing list
    management system written mostly in Python. Features:
    
    - Web based list administration for nearly all tasks.  Web based
      subscriptions and user configuration management. A customizable
      "home page" for each mailing list.
    - Privacy features such as moderation, open and closed list
      subscription policies, private membership rosters, and sender-based
      filters.
    - Automatic web based archiving built-in with support for private
      and public archives, and hooks for external archivers.
    - Per-user configuration optional digest delivery for either
      MIME-compliant or RFC 1153 style "plain text" digests.
    - Integrated mail/Usenet gateways.
    - Integrated auto-replies.
    - Majordomo-style email based commands.
    - Integrated bounce detection within an extensible framework.
    - Integrated spam detection, and MIME-based content filtering.
    - An extensible mail delivery pipeline.
    - Support for virtual domains.
    
    See the Mailman home site for current status, including new releases
    and known problems: https://www.list.org/

    List of rpms provided by this srpm:
    mailman (x86_64, ppc64le, i586, armh, aarch64)
    mailman-apache2 (noarch)
    mailman-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
    mailman-docs (noarch)
    mailman-nginx (noarch)

    Maintainer: Dmitry V. Levin


      1. python
      2. python-devel
      3. python-module-dns
      4. rpm-macros-webserver-common
      5. rpm-macros-apache2

    Last changed


    Nov. 13, 2021 Dmitry V. Levin 5:2.1.37-alt1
    - 2.1.36 -> 2.1.37 (fixes bug in the fix for CVE-2021-43332).
    Nov. 13, 2021 Konstantin Lepikhov 5:2.1.36-alt1
    - Updated to 2.1.36.
    - Security fixes:
      + CVE-2021-43331: A potential XSS attack via the user options.
      + CVE-2021-43332: A potential for for a list moderator to carry out an
                        off-line brute force attack to obtain the list
    		    admin password.
    Nov. 6, 2021 Konstantin Lepikhov 5:2.1.35-alt1
    - Updated to 2.1.35:
    - Security fixes:
      + CVE-2021-42096: Attack to obtain the list admin password.
      + CVE-2021-42097: A CSRF attack via the user options page
                        could allow takeover of a users