MGASA-2020-0276 - Updated mailman packages fix security vulnerability

Publication date: 05 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0276.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-12137,
     CVE-2020-12108,
     CVE-2020-15011

Updated mailman package fixes security vulnerability:

Up to mailman 2.1.29 when sending a file without a file extension (or an
unknown file extension) then the file is stored in the list archive with
the file extension .obj. Most web servers will try to assign a mime type
based on the file extension and entries in /etc/mime.types, where .obj is
usually not specified. This means the web server will send it out without
a mime type. 
The browser will then try to guess the MIME type based on the file's
content (MIME-sniffing). If the content is HTML then it will execute any
javascript contained, leading to a potential cross-site scripting
vulnerability.

The mailman package has been updated to version 2.1.30, fixing this bug
and other issues.  See the release announcement for details.

References:
- https://bugs.mageia.org/show_bug.cgi?id=26253
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- https://mail.python.org/pipermail/mailman-announce/2020-April/000250.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15011

SRPMS:
- 7/core/mailman-2.1.33-1.mga7

Mageia 2020-0276: mailman security update

Updated mailman package fixes security vulnerability: Up to mailman 2.1.29 when sending a file without a file extension (or an unknown file extension) then the file is stored in t...

Summary

Updated mailman package fixes security vulnerability:
Up to mailman 2.1.29 when sending a file without a file extension (or an unknown file extension) then the file is stored in the list archive with the file extension .obj. Most web servers will try to assign a mime type based on the file extension and entries in /etc/mime.types, where .obj is usually not specified. This means the web server will send it out without a mime type. The browser will then try to guess the MIME type based on the file's content (MIME-sniffing). If the content is HTML then it will execute any javascript contained, leading to a potential cross-site scripting vulnerability.
The mailman package has been updated to version 2.1.30, fixing this bug and other issues. See the release announcement for details.

References

- https://bugs.mageia.org/show_bug.cgi?id=26253

- https://www.openwall.com/lists/oss-security/2020/02/24/2

- https://mail.python.org/pipermail/mailman-announce/2020-April/000250.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12137

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12108

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15011

Resolution

MGASA-2020-0276 - Updated mailman packages fix security vulnerability

SRPMS

- 7/core/mailman-2.1.33-1.mga7

Severity
Publication date: 05 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0276.html
Type: security
CVE: CVE-2020-12137, CVE-2020-12108, CVE-2020-15011

Related News