Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAB=ivF95gmkRr74nu5+_XmNkQKdGd==4hB+9N8EmaELQz+vHxQ@mail.gmail.com>
Date: Sun, 7 Aug 2022 08:39:59 -0700
From: Roxana Bradescu <roxabee@...omium.org>
To: oss-security@...ts.openwall.com, security@...m.org
Subject: Re: Exim < 4.95 heap overflow

Adding the Exim security folks to this thread to shed some light on the
original report and CVE discussion.

Per their
https://github.com/Exim/exim/wiki/SecurityReleaseProcess they email this
group and distros to notify of security issues. They will also issue CVEs.
However I don’t actually see any CVE issued since 2019
https://github.com/Exim/exim/wiki/EximSecurity

—-
Regards, Roxana

On Sun, Aug 7, 2022 at 6:49 AM John Helmert III <ajak@...too.org> wrote:

> On Sat, Aug 06, 2022 at 10:46:42PM +0300, Evgeny Legerov wrote:
> > Hi,
> >
> >
> > Here is another bug which has been silently fixed in Exim.
> >
> > It has not been recognized as a security issue, many distros still don't
> > have this patch.
>
> Why do you say it hasn't been recognized as a security issue? Distros
> don't usually have a way of knowing about a vulnerability that needs
> patching without a CVE. Have you requested a CVE?
>
> > Original report + patch  is here -
> >
> https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743
>
> That commit does not seem like an original report.
>
> > Analysis of the bug  - https://github.com/ivd38/exim_overflow
> >
> > I don't post here because it is huge snippet of code.
> >
> >
> > regards,
> >
> > -e
> >
> >
> >
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.