A CSRF vulnerability has been reported by Riccardo Schirone of RedHat. This is assigned CVE-2021-44227. I plan to release Mailman 2.1.38 on Tuesday, 30 November to fix this.
I am pleased to announce the release of Mailman 2.1.38.
This is a security release. It fixes https://bugs.launchpad.net/mailman/+bug/1952384 CVE-2021-44227. This could allow a list moderator or member to carry out a CSRF attack against the list's admin page.
For those who just want a patch for the security issues, patches are atteched.
As noted Mailman 2.1.30 was the last feature release of the Mailman 2.1 branch from the GNU Mailman project. There has been some discussion as to what this means. It means there will be no more releases from the GNU Mailman project containing any new features. There may be future patch releases to address the following:
i18n updates. security issues. bugs affecting operation for which no satisfactory workaround exists.
Mailman 2.1.38 is the eighth such patch release.
Mailman is free software for managing email mailing lists and e-newsletters. Mailman is used for all the python.org and SourceForge.net mailing lists, as well as at hundreds of other sites.
For more information, please see our web site at one of:
http://www.list.org https://www.gnu.org/software/mailman http://mailman.sourceforge.net/
Mailman 2.1.38 can be downloaded from
https://launchpad.net/mailman/2.1/ https://ftp.gnu.org/gnu/mailman/ https://sourceforge.net/projects/mailman/