Re: [Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-11 Thread Axel Beckert
Hi! Am Fri, Feb 11, 2005 at 10:06:55AM +0900, Tokio Kikuchi schrieb: > >Python 1 (respective at least 1.5.2) complains about syntax > >errors. (Which, in fact, also helps against the vulnerability by > >displaying the "You've found a Mailman bug" page. ;-) > > Change the true_path function as: >

Re: [Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-10 Thread John Dennis
To answer a few recent questions. To the best of my knowledge the patch is safe for any version of mailman that contains the function true_path in private.py. You will not see a new .pyc or .pyo file generated until the script is executed for the first time after the change. In other words until

Re: [Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-10 Thread AJ
OK, thanks. With no modifications it did not apply, but I can probably get it to work. It shouldn't cause any issues w/ 2.1 should it? Thanks. Quoting Ralf Hildebrandt <[EMAIL PROTECTED]>: * AJ <[EMAIL PROTECTED]>: Can this be applied to any 2.1 release? I am running 2.1 at the moment. The patch

Re: [Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-10 Thread Ralf Hildebrandt
* AJ <[EMAIL PROTECTED]>: > Can this be applied to any 2.1 release? > I am running 2.1 at the moment. The patch is very small, so I'd think yes. -- Ralf Hildebrandt (i.A. des IT-Zentrum) [EMAIL PROTECTED] Charite - Universitätsmedizin BerlinTel. +49 (0)30-450 570-155 Gemeins

Re: [Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-10 Thread AJ
Can this be applied to any 2.1 release? I am running 2.1 at the moment. Thanks. > Until Mailman 2.1.6 is released, the longer term fix is to apply this > patch: > > http://www.list.org/CAN-2005-0202.txt -- Mailman-Users mailing list Mailm

[Mailman-Users] Critical security update for Mailman 2.1.5 and earlier

2005-02-10 Thread Barry Warsaw
There is a critical security flaw in Mailman 2.1.5 and earlier Mailman 2.1 versions which can allow remote attackers to gain access to member passwords under certain conditions. The extent of the vulnerability depends on what version of Apache you are running, and (possibly) how you have configure