SUSE Security Update: Security update for mailman ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1886-1 Rating: important References: #1191959 #1192735 #1192741 #1193316 Cross-References: CVE-2021-42096 CVE-2021-43331 CVE-2021-43332 CVE-2021-44227 CVSS scores: CVE-2021-42096 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2021-43331 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L CVE-2021-43332 (SUSE): 7.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L CVE-2021-44227 (SUSE): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L Affected Products: HPE Helion Openstack 8 SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP4-LTSS SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for mailman fixes the following issues: - CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316). - CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741). - CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735). - CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-1886=1 - SUSE OpenStack Cloud Crowbar 8: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-1886=1 - SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-1886=1 - SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2022-1886=1 - SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-1886=1 - SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1886=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1886=1 - SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-1886=1 - SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1886=1 - SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-1886=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1886=1 - HPE Helion Openstack 8: zypper in -t patch HPE-Helion-OpenStack-8-2022-1886=1 Package List: - SUSE OpenStack Cloud Crowbar 9 (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE OpenStack Cloud Crowbar 8 (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE OpenStack Cloud 9 (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE OpenStack Cloud 8 (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (ppc64le s390x x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le s390x x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 - HPE Helion Openstack 8 (x86_64): mailman-2.1.17-3.26.1 mailman-debuginfo-2.1.17-3.26.1 mailman-debugsource-2.1.17-3.26.1 References: https://www.suse.com/security/cve/CVE-2021-42096.html https://www.suse.com/security/cve/CVE-2021-43331.html https://www.suse.com/security/cve/CVE-2021-43332.html https://www.suse.com/security/cve/CVE-2021-44227.html https://bugzilla.suse.com/1191959 https://bugzilla.suse.com/1192735 https://bugzilla.suse.com/1192741 https://bugzilla.suse.com/1193316