------------------------------------------------------------
revno: 1856
committer: Mark Sapiro <m...@msapiro.net>
branch nick: 2.1
timestamp: Fri 2020-06-26 17:08:07 -0700
message:
  Added a couple of CVE references.
modified:
  NEWS


--
lp:mailman/2.1
https://code.launchpad.net/~mailman-coders/mailman/2.1

Your team Mailman Checkins is subscribed to branch lp:mailman/2.1.
To unsubscribe from this branch go to 
https://code.launchpad.net/~mailman-coders/mailman/2.1/+edit-subscription
=== modified file 'NEWS'
--- NEWS	2020-06-21 18:45:30 +0000
+++ NEWS	2020-06-27 00:08:07 +0000
@@ -32,13 +32,13 @@
   Security
 
     - A content injection vulnerability via the private login page has been
-      fixed.  (LP: #1877379)
+      fixed.  CVE-2020-15011  (LP: #1877379)
 
 2.1.32 (05-May-2020)
 
   i18n
 
-    Fixed a typo in the Spanish translation and uptated mailman.pot and
+    Fixed a typo in the Spanish translation and updated mailman.pot and
     the message catalog for 2.1.31 security fix.
 
 2.1.31 (05-May-2020)
@@ -46,7 +46,8 @@
   Security
 
     - A content injection vulnerability via the options login page has been
-      discovered and reported by Vishal Singh. This is fixed.  (LP: #1873722)
+      discovered and reported by Vishal Singh. This is fixed.  CVE-2020-12108
+      (LP: #1873722)
 
   i18n
 

_______________________________________________
Mailman-checkins mailing list -- mailman-checkins@python.org
To unsubscribe send an email to mailman-checkins-le...@python.org
https://mail.python.org/mailman3/lists/mailman-checkins.python.org/
Member address: arch...@jab.org

Reply via email to