Updated mailman packages that fix one bug are now available for Red HatEnterprise Linux 5.

Mailman is a program used to help manage email discussion lists.This update fixes the following bug:* Previously, Mailman list subscribers that belonged to a mail server with”reject” policy for Domain-based Message Authentication, Reporting & Conformance(DMARC), such as yahoo.com or AOL.com, could not receive any Mailman forwardedmessages whose sender resided in any domain that provided Sender alignment forDomain Key Identified Mail (DKIM) signatures. With this update, domains with”reject” DMARC policy are recognized correctly, and Mailman list administratorscan configure the way these messages are handled. After proper configuration,subscribers now correctly receive Mailman forwarded messages in theaforementioned situation. (BZ#1192124)Users of mailman are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
mailman-2.1.9-8.el5_11.src.rpm
    MD5: f3363bd559cf42dc6ab8a83739972a2dSHA-256: a3e7caeca44723d1a156f74159b881c7f04b4bc70135337324de64293d77de17
 
IA-32:
mailman-2.1.9-8.el5_11.i386.rpm
    MD5: ebf084ad8caa28e91e9cc9c5fb5a0dfeSHA-256: 6b25c56590959a21f3ab68754b93af69091f9cd608832cc1b6c64978a36cf89e
mailman-debuginfo-2.1.9-8.el5_11.i386.rpm
    MD5: 2480653959dd05a59e1b1b229a289d63SHA-256: a6ef147c4446974d96c124e6c622f189ce37ba2487a5f0067659af3f1810d9b2
 
x86_64:
mailman-2.1.9-8.el5_11.x86_64.rpm
    MD5: 189d9eaae1b4ce549dcb3b9cce7fc125SHA-256: 4020080f216d82765a0ba716702f50decd54f121084627cc8b6064e88289d1db
mailman-debuginfo-2.1.9-8.el5_11.x86_64.rpm
    MD5: f575f4bca42603ccd61c310e3ec1e1bfSHA-256: 5a4b0a889ecdd3212ccb4ffe74559359fcca91fe78b7ffbb9e9ac7aec643105c
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mailman-2.1.9-8.el5_11.src.rpm
    MD5: f3363bd559cf42dc6ab8a83739972a2dSHA-256: a3e7caeca44723d1a156f74159b881c7f04b4bc70135337324de64293d77de17
 
IA-32:
mailman-2.1.9-8.el5_11.i386.rpm
    MD5: ebf084ad8caa28e91e9cc9c5fb5a0dfeSHA-256: 6b25c56590959a21f3ab68754b93af69091f9cd608832cc1b6c64978a36cf89e
mailman-debuginfo-2.1.9-8.el5_11.i386.rpm
    MD5: 2480653959dd05a59e1b1b229a289d63SHA-256: a6ef147c4446974d96c124e6c622f189ce37ba2487a5f0067659af3f1810d9b2
 
IA-64:
mailman-2.1.9-8.el5_11.ia64.rpm
    MD5: d958349a06a4caf220bc74961119801fSHA-256: 0c50c42474eea99700218765c270a01e984f988e08cd061483a842024dbdcf98
mailman-debuginfo-2.1.9-8.el5_11.ia64.rpm
    MD5: f14c5c20e952423ad6638d2f6942a841SHA-256: ef59dd591c6c358af7d38cba77ae87ce72cc6263c679933786c4cd94308d4118
 
PPC:
mailman-2.1.9-8.el5_11.ppc.rpm
    MD5: b13118f473c484dc6aacf769f54a021eSHA-256: bab7a488a9d0da2a4e41707bbbe3dcbedadea68f512c2491afb9df2bea583257
mailman-debuginfo-2.1.9-8.el5_11.ppc.rpm
    MD5: 71fb88ed4985db8c50c0e29424ab062eSHA-256: b3c204a4e729f6be712300176fa8c98f45e4ba312f8a4c0a7c5afce775330809
 
s390x:
mailman-2.1.9-8.el5_11.s390x.rpm
    MD5: e408eae73469f1454aa79dc2eb077db4SHA-256: 16b176d93a69627dc7ed8d15e438b62465692b9fef54bde0876395958a3c7f08
mailman-debuginfo-2.1.9-8.el5_11.s390x.rpm
    MD5: 908041548662becbd554902b3011a0e7SHA-256: 24fc3f81dd7fa87cb30f28d4d40e148f46706a855f8bc08db9dab1870c67c4c5
 
x86_64:
mailman-2.1.9-8.el5_11.x86_64.rpm
    MD5: 189d9eaae1b4ce549dcb3b9cce7fc125SHA-256: 4020080f216d82765a0ba716702f50decd54f121084627cc8b6064e88289d1db
mailman-debuginfo-2.1.9-8.el5_11.x86_64.rpm
    MD5: f575f4bca42603ccd61c310e3ec1e1bfSHA-256: 5a4b0a889ecdd3212ccb4ffe74559359fcca91fe78b7ffbb9e9ac7aec643105c
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply