Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 16 Dec 2016 00:36:45 +0100
From: Heiko Schlittermann <hs@...littermann.de>
To: oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request - Exim 4.69-4.87 - disclosure of private information

Hello,

please assign a CVE ID

Product:    Exim
Versions:   4.69 -> 4.87
Impact:     Possible leak of private information to a remote attacker
Reference:  https://bugs.exim.org/show_bug.cgi?id=1996 (placeholder currently)
Requester:  Heiko Schlittermann <hs@...littermann.de> (Exim Developer)
Credits:    Bjoern Jacke <bjoern@....de>

If several conditions are met, Exim leaks private information to
a remote attacker.

A patch exists and is under testing already.
Backports to older versions are under development.

As soon as the tests are passed we'll send an announcement
to the "Operating system distribution security contacts list" and
ask for packaging fixed versions.

    Best regards from Dresden/Germany
    Viele Grüße aus Dresden
    Heiko Schlittermann              - Exim developer
-- 
 SCHLITTERMANN.de ---------------------------- internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --------------- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01 ------------ -

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ