Описание
Security update for exim
This update for exim fixes the following issues:
Changes in exim:
-
specify users with ref:mail, to make them dynamic. (boo#1046971)
-
CVE-2017-1000369: Fixed memory leaks that could be exploited to 'stack crash' local privilege escalation (boo#1044692)
-
Require user(mail) group(mail) to meet new users handling in TW.
-
Prerequire permissions (fixes rpmlint).
-
conditionally disable DANE on SuSE versions with OpenSSL < 1.0
-
CVE-2016-1531: when installed setuid root, allows local users to gain privileges via the perl_startup argument.
-
CVE-2016-9963: DKIM information leakage (boo#1015930)
-
Makefile tuning:
- add sqlite support
- disable WITH_OLD_DEMIME
- enable AUTH_CYRUS_SASL
- enable AUTH_TLS
- enable SYSLOG_LONG_LINES
- enable SUPPORT_PAM
- MAX_NAMED_LIST=64
- enable EXPERIMENTAL_DMARC
- enable EXPERIMENTAL_EVENT
- enable EXPERIMENTAL_PROXY
- enable EXPERIMENTAL_CERTNAMES
- enable EXPERIMENTAL_DSN
- enable EXPERIMENTAL_DANE
- enable EXPERIMENTAL_SOCKS
- enable EXPERIMENTAL_INTERNATIONAL
Список пакетов
openSUSE Leap 42.2
openSUSE Leap 42.3
Ссылки
- E-Mail link for openSUSE-SU-2017:2289-1
- SUSE Security Ratings
Описание
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
Затронутые продукты
Ссылки
- CVE-2016-1531
- SUSE Bug 968844
Описание
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
Затронутые продукты
Ссылки
- CVE-2016-9963
- SUSE Bug 1015930
- SUSE Bug 1053919
Описание
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.
Затронутые продукты
Ссылки
- CVE-2017-1000369
- SUSE Bug 1037551
- SUSE Bug 1044692