Headline
RHSA-2021:4916: Red Hat Security Advisory: mailman:2.1 security update
An update for the mailman:2.1 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-44227: mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat Openshift Container Storage
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2021-12-02
Updated:
2021-12-02
RHSA-2021:4916 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: mailman:2.1 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for the mailman:2.1 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Mailman is a program used to help manage e-mail discussion lists.
Security Fix(es):
- mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for ARM 64 8 aarch64
Fixes
- BZ - 2026862 - CVE-2021-44227 mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
Red Hat Enterprise Linux for x86_64 8
SRPM
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.src.rpm
SHA-256: 4c5ef0dbc40b86fd9ecf608f949d42ce917e70df6b359e8de26a517b23b15c98
x86_64
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.x86_64.rpm
SHA-256: faa729d6e4c2b3e4208ec8e150b136ff181b31755fc25c6bedb97e50163227c7
mailman-debuginfo-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.x86_64.rpm
SHA-256: 0c55e5d68a2ad2f427b44f530ea17e11f80de92a7e638d84e1f7d9ae2753b940
mailman-debugsource-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.x86_64.rpm
SHA-256: 606106dee12cfa2644437d44bc5520eb27578145c1fcfd1ea7573039842de7bc
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.src.rpm
SHA-256: 4c5ef0dbc40b86fd9ecf608f949d42ce917e70df6b359e8de26a517b23b15c98
s390x
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.s390x.rpm
SHA-256: fa90ea09e72956b454dff99ad2467f17f25c0af6a331044eb38f46980f727b1f
mailman-debuginfo-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.s390x.rpm
SHA-256: a60e5ececf3ee18266b0e5f1bb15b6f26d37be74a7a2083caab813badd84f1f2
mailman-debugsource-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.s390x.rpm
SHA-256: 88733e4a92a03834af2bd00c4934b33ca73cc3f5b6d2753ff0d71edaf7898128
Red Hat Enterprise Linux for Power, little endian 8
SRPM
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.src.rpm
SHA-256: 4c5ef0dbc40b86fd9ecf608f949d42ce917e70df6b359e8de26a517b23b15c98
ppc64le
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.ppc64le.rpm
SHA-256: 2bea49107f38349be88dd1bea96990b650c6f91f1cafa13bf44a23f48863fcd0
mailman-debuginfo-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.ppc64le.rpm
SHA-256: c1edf2fc7dee653fbefea774339cc56f96a1824c0efd35977666d8701b80462f
mailman-debugsource-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.ppc64le.rpm
SHA-256: 5977ba546c1a5d931637af876661a0e04ac1ffdd0a478fa4223c15fe0d1c381d
Red Hat Enterprise Linux for ARM 64 8
SRPM
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.src.rpm
SHA-256: 4c5ef0dbc40b86fd9ecf608f949d42ce917e70df6b359e8de26a517b23b15c98
aarch64
mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.aarch64.rpm
SHA-256: 095ca6f7ebc94f7c8c88e6f5b2d52d6a83fd287d3de494ba4e028264986ff733
mailman-debuginfo-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.aarch64.rpm
SHA-256: a666961a0e97e31723c9935277fcd754e784c1c56a3d49b4aaf3971542f60a58
mailman-debugsource-2.1.29-12.module+el8.5.0+13466+327eb9f3.2.aarch64.rpm
SHA-256: dcac432baf4af8c3f1329355ea7ce8450e7b73cf4d44202fe135b948a445e008
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.