Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3517-1] exim4 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3517-1] exim4 security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3517-1] exim4 security update
  • Date: Mon, 14 Mar 2016 05:48:18 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Mon, 14 Mar 2016 05:48:38 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <knpMLQrGOw.A.II.2Cl5WB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3517-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 14, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : exim4
CVE ID : CVE-2016-1531

A local root privilege escalation vulnerability was found in Exim,
Debian's default mail transfer agent, in configurations using the
'perl_startup' option (Only Exim via exim4-daemon-heavy enables Perl
support).

To address the vulnerability, updated Exim versions clean the complete
execution environment by default, affecting Exim and subprocesses such
as transports calling other programs, and thus may break existing
installations. New configuration options (keep_environment,
add_environment) were introduced to adjust this behavior.

More information can be found in the upstream advisory at
https://www.exim.org/static/doc/CVE-2016-1531.txt

For the oldstable distribution (wheezy), this problem has been fixed
in version 4.80-7+deb7u2.

For the stable distribution (jessie), this problem has been fixed in
version 4.84.2-1.

For the testing distribution (stretch), this problem has been fixed
in version 4.86.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 4.86.2-1.

We recommend that you upgrade your exim4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=WpbR
-----END PGP SIGNATURE-----




  • [IT-SecNots] [SECURITY] [DSA 3517-1] exim4 security update, Salvatore Bonaccorso, 14.03.2016

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang