Пакет mailman: Информация

  • Default inline alert: Версия в репозитории: 2.1.39-alt1

Исходный пакет: mailman
Версия: 2.1.37-alt1
Последняя версия по данным Repology
Собран:  13 ноября 2021 г. 3:18 в задании #289475
Категория: Система/Серверы
Сообщить об ошибке в пакете
Домашняя страница: https://www.list.org/

Лицензия: GPL-2.0-or-later
О пакете: Mailing list manager with built in web access
Описание: 
Mailman, the GNU Mailing List Management System, is a mailing list
management system written mostly in Python. Features:

- Web based list administration for nearly all tasks.  Web based
  subscriptions and user configuration management. A customizable
  "home page" for each mailing list.
- Privacy features such as moderation, open and closed list
  subscription policies, private membership rosters, and sender-based
  filters.
- Automatic web based archiving built-in with support for private
  and public archives, and hooks for external archivers.
- Per-user configuration optional digest delivery for either
  MIME-compliant or RFC 1153 style "plain text" digests.
- Integrated mail/Usenet gateways.
- Integrated auto-replies.
- Majordomo-style email based commands.
- Integrated bounce detection within an extensible framework.
- Integrated spam detection, and MIME-based content filtering.
- An extensible mail delivery pipeline.
- Support for virtual domains.

See the Mailman home site for current status, including new releases
and known problems: https://www.list.org/

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
mailman (x86_64, ppc64le, i586, armh, aarch64)
mailman-apache2 (noarch)
mailman-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mailman-docs (noarch)
mailman-nginx (noarch)

Сопровождающий: Dmitry V. Levin



    1. python
    2. python-devel
    3. python-module-dns
    4. rpm-macros-apache2
    5. rpm-macros-webserver-common

Последнее изменение


13 ноября 2021 г. Dmitry V. Levin 5:2.1.37-alt1
- 2.1.36 -> 2.1.37 (fixes bug in the fix for CVE-2021-43332).
13 ноября 2021 г. Konstantin Lepikhov 5:2.1.36-alt1
- Updated to 2.1.36.
- Security fixes:
  + CVE-2021-43331: A potential XSS attack via the user options.
  + CVE-2021-43332: A potential for for a list moderator to carry out an
                    off-line brute force attack to obtain the list
		    admin password.
6 ноября 2021 г. Konstantin Lepikhov 5:2.1.35-alt1
- Updated to 2.1.35:
- Security fixes:
  + CVE-2021-42096: Attack to obtain the list admin password.
  + CVE-2021-42097: A CSRF attack via the user options page
                    could allow takeover of a users