[SECURITY] [DSA 4110-1] exim4 security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4110-1                   security@xxxxxxxxxx
https://www.debian.org/security/                     Salvatore Bonaccorso
February 10, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : exim4
CVE ID         : CVE-2018-6789
Debian Bug     : 890000

Meh Chang discovered a buffer overflow flaw in a utility function used
in the SMTP listener of Exim, a mail transport agent. A remote attacker
can take advantage of this flaw to cause a denial of service, or
potentially the execution of arbitrary code via a specially crafted
message.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.84.2-2+deb8u5.

For the stable distribution (stretch), this problem has been fixed in
version 4.89-2+deb9u3.

We recommend that you upgrade your exim4 packages.

For the detailed security status of exim4 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/exim4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
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=adqv
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux