drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in exim4
Name: |
Pufferüberlauf in exim4 |
|
ID: |
DSA-4536-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Sa, 28. September 2019, 10:07 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16928 |
|
Applikationen: |
exim |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4536-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 28, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : exim4 CVE ID : CVE-2019-16928
A buffer overflow flaw was discovered in Exim, a mail transport agent. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code.
For the stable distribution (buster), this problem has been fixed in version 4.92-8+deb10u3.
We recommend that you upgrade your exim4 packages.
For the detailed security status of exim4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/exim4
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl2PB39fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0S1Mw//QYO6JUMl0GxGtb9gnFFFQsfkEpF5zd5Ua2TH7jA1WY5t8z/J4VmKoxqy JV6gM+iCzcRlzOHICujjflg6kqM9zUwX/1E7HdCg+3L8eEr7fGJzvfW5e5EgP3gN Hilk9Mb4WBNpOe3OlpwvGXHGbXbL0TuFpSAjNYi7b8L4xdce2jKexqLAjWEOPJKw KEDxgbPdObjSyXRm27n0lgfrJfasDL0ekzDGnUq2Jx7Wb3z0ldjEPrhPHD1uOJBY 0/bCE8kOSXzf1hO3lDg0Uc9jwBZjJwI0CSla+/ZwGQdayVj14NKmklBXSOugeUVX ZdPExYVa54mvruYbPIJexk0j+AN9FzIADwAXKpbkNuaAe9uHoougJdSU+MDYDv3A tFUFORAaNmRaLYxMHlBvd2UQ79qL6gphWuYNpOJOkYaxZa/aE82XH2pTT5Lehlu2 aMUoStwclH5wjWoT9LpH20LBbu5cwNzuRL9uCw3OK6XWzRDpBPXi1b1dkzcf6jgE HjWVsBZkh11Ah+wnFCKg/vv2TAVcKuOz4/U6WLJ7jAbn9flzzCNrH8lfUm49epZj xYADGuoH8BuJeQJwLj2aiNf/JFhSsKyOoXXXjHbvlR/5YOBiUxlRqTujwDt/YA/J pAEDfLAw0d6XworKr47+yTiqUQG++CZYpGYAcK/2R0eU8tQXiZc= =jv3k -----END PGP SIGNATURE-----
|
|
|
|