|
|
Message-ID: <87qznvcfzx.fsf@mid.deneb.enyo.de> Date: Fri, 01 May 2026 17:21:38 +0200 From: Florian Weimer <fw@...eb.enyo.de> To: Solar Designer <solar@...nwall.com> Cc: oss-security@...ts.openwall.com, Bernard Quatermass <bernardq@...m.org>, security@...m.org Subject: Re: Exim 4.99.2 fixes 4 CVEs * Solar Designer: > From: Bernard Quatermass <bernardq@...m.org> > Subject: Re: [vs-plain] EXIM-Security-2026-04-24 > To: "Distros @ oss-security openwall" <distros@...openwall.org> > CC: "security@...m.org" <security@...m.org> > Date: Wed, 29 Apr 2026 13:19:42 +0100 (2 days, 3 hours, 26 seconds ago) > > we are pleased to announce the availability of release 4.99.2 of Exim. > > This is a security release. > > It fixes the following vulnerabilities. > > CVE-2026-40684 Possible crash with malicious DNS data when using musl libc > > On systems using musl libc (not glibc) due to an oddity in octal printing > it is possible to crash the connection instance when malformed DNS data > is present in PTR records. I sent a note to Rich Felker (musl maintainer) regarding this.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.