OESA-2022-1931

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1931
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1931.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2022-1931
Upstream
Published
2022-09-23T11:04:18Z
Modified
2025-09-03T06:17:41.716364Z
Summary
mailman security update
Details

Mailman is free software for managing electronic mail discussion and e-newsletter lists. Mailman is integrated with the web, making it easy for users to manage their accounts and for list owners to administer their lists. Mailman supports built-in archiving, automatic bounce processing, content filtering, digest delivery, spam filters, and more.

Security Fix(es):

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.(CVE-2021-43332)

In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.(CVE-2021-43331)

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.(CVE-2021-44227)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP3 / mailman

Package

Name
mailman
Purl
pkg:rpm/openEuler/mailman&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.36-2.oe1

Ecosystem specific

{
    "aarch64": [
        "mailman-debuginfo-2.1.36-2.oe1.aarch64.rpm",
        "mailman-debugsource-2.1.36-2.oe1.aarch64.rpm",
        "mailman-2.1.36-2.oe1.aarch64.rpm"
    ],
    "x86_64": [
        "mailman-debuginfo-2.1.36-2.oe1.x86_64.rpm",
        "mailman-debugsource-2.1.36-2.oe1.x86_64.rpm",
        "mailman-2.1.36-2.oe1.x86_64.rpm"
    ],
    "src": [
        "mailman-2.1.36-2.oe1.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2022-1931.json"