967d8d70ce
From maintainer Nikolay Sturm <sturm@sec.informatik.tu-darmstadt.de>. mailman changes: - Implemented a guard against some reply loops and 'bot subscription attacks. Specifically, if a message to -request has a Precedence: bulk (or list, or junk) header, the command is ignored. Well-behaved 'bots should always include such a header. - Changes to the configure script so that you can pass in the mail host and web host by setting the environment variables MAILHOST and WWWHOST respectively. configure will also exit if it can't figure out these values (usually due to broken dns). - Closed another minor cross-site scripting vulnerability.
4 lines
200 B
Plaintext
4 lines
200 B
Plaintext
MD5 (mailman-2.0.12.tgz) = 94999f0954ff91e880a2102717c0474e
|
|
RMD160 (mailman-2.0.12.tgz) = 3b15d4e1da5b1c872b4676506bdb896dbf34f2f6
|
|
SHA1 (mailman-2.0.12.tgz) = e1268a347168e4c61aaffbcd8cd8d92483a92766
|