<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mailman</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:13924-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-01-04T10:03:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-01-04T10:03:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-01-04T10:03:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mailman</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sleposp3-mailman-13924,slessp3-mailman-13924,slessp4-mailman-13924</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      <Description>Link for SUSE-SU-2019:13924-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:13924-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077358</URL>
      <Description>SUSE Bug 1077358</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099510</URL>
      <Description>SUSE Bug 1099510</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101288</URL>
      <Description>SUSE Bug 1101288</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/925502</URL>
      <Description>SUSE Bug 925502</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995352</URL>
      <Description>SUSE Bug 995352</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2775/</URL>
      <Description>SUSE CVE CVE-2015-2775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6893/</URL>
      <Description>SUSE CVE CVE-2016-6893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0618/</URL>
      <Description>SUSE CVE CVE-2018-0618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13796/</URL>
      <Description>SUSE CVE CVE-2018-13796 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5950/</URL>
      <Description>SUSE CVE CVE-2018-5950 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp3">SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="mailman-2.1.15-9.6.6.1">
      <FullProductName ProductID="mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="mailman-2.1.15-9.6.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mailman-2.1.15-9.6.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mailman-2.1.15-9.6.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="mailman-2.1.15-9.6.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="mailman-2.1.15-9.6.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1">mailman-2.1.15-9.6.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.</Note>
    </Notes>
    <CVE>CVE-2015-2775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2775.html</URL>
        <Description>CVE-2015-2775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925502</URL>
        <Description>SUSE Bug 925502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.</Note>
    </Notes>
    <CVE>CVE-2016-6893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6893.html</URL>
        <Description>CVE-2016-6893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995352</URL>
        <Description>SUSE Bug 995352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997205</URL>
        <Description>SUSE Bug 997205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2018-0618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0618.html</URL>
        <Description>CVE-2018-0618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099510</URL>
        <Description>SUSE Bug 1099510</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.</Note>
    </Notes>
    <CVE>CVE-2018-13796</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13796.html</URL>
        <Description>CVE-2018-13796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101288</URL>
        <Description>SUSE Bug 1101288</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.</Note>
    </Notes>
    <CVE>CVE-2018-5950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:mailman-2.1.15-9.6.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-201913924-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5950.html</URL>
        <Description>CVE-2018-5950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077358</URL>
        <Description>SUSE Bug 1077358</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
