From owner-freebsd-ports Sat Dec 1 15:18:42 2001 Delivered-To: freebsd-ports@freebsd.org Received: from hopi.hostsharing.net (hopi.hostsharing.net [66.70.34.150]) by hub.freebsd.org (Postfix) with ESMTP id AA5BD37B41E; Sat, 1 Dec 2001 15:18:36 -0800 (PST) Received: by hopi.hostsharing.net (Postfix, from userid 542) id 65A59980BD; Sun, 2 Dec 2001 00:17:45 +0100 (CET) Date: Sun, 2 Dec 2001 00:17:45 +0100 From: Noel Koethe To: ports@freebsd.org Cc: security@freebsd.org Subject: security problem mailman Message-ID: <20011202001745.A14848@hopi.hostsharing.net> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable User-Agent: Mutt/1.3.22i Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hello, in the freebsd ports ist mailman 2.0.5 =46rom http://mail.python.org/pipermail/mailman-announce/2001-November/0000= 31.html " Hot on the heels of Mailman 2.0.7, I'm now releasing 2.0.8 which fixes several cross-site scripting security holes, and a few other minor bug fixes. More information on cross-site scripting exploits in general can be found at http://www.cert.org/advisories/CA-2000-02.html =2E... " see also http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00242.html http://mail.python.org/pipermail/mailman-announce/2001-November/000030.html it would be great if the port of mailman will be updated. Thank you. --=20 No=E8l K=F6the To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message