![]() |
|
Message-ID: <snxv44vulcov44kxrth6lpsxkarsaftrhgrn7dpil7em56y4bh@7pxdvapkdcxc> Date: Wed, 26 Mar 2025 16:57:48 +0200 From: Valtteri Vuorikoski <vuori@...com.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-30232: UAF in Exim 4.96 to 4.98.1 The Exim project has announced a potentially (locally-?)exploitable UAF in versions 4.96 through 4.98.1. Bulletin posted to <https://exim.org/static/doc/security/CVE-2025-30232.txt>: > # CVE 2025-30232 > ## Timeline > - 2025/03/13 Report received > - 2025/03/18 ACK sent to reporter > - 2025/03/19 CVE assigned > - 2025/03/19 Distros heads-up mail, to <distros@...openwall.org> and <exim-maintainers@...ts.exim.org> > - 2025/03/21 14:00 UTC Security Release available for (only) Distros > - 2025/03/25 14:00 UTC Public heads-up notification, to <exim-announce@...ts.exim.org> > - 2025/03/26 14:00 UTC Published the changes on https://code.exim.org/exim/exim.git > ## Details > A use-after-free is possible, with potential for privilege escalation. > The following conditions have to be met for being vulnerable: > - Exim Version > - 4.96 > - 4.97 > - 4.98 > - 4.98.1 > - Command-line access > ## Acknowledgements > Thanks to Trend Micro for reporting this issue in a responsible manner. > - Ref: ZDI-CAN-26250 > - Email: <zdi-disclosures@...ndmicro.com> At least Debian bookworm ships with 4.96. Security tracker lists bookworm as vulnerable with version 4.96-15+deb12u6, but apt upgrade just now installed 4.96-15+deb12u7 containing a binary dated 4 days ago from the security repository. -Valtteri
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.