Vulnerability from csaf_opensuse
Published
2024-01-03 20:12
Modified
2024-01-03 20:12
Summary
Security update for exim
Notes
Title of the patch
Security update for exim
Description of the patch
This update for exim fixes the following issues:
exim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):
* Fixes for the smtp protocol smuggling (CVE-2023-51766)
exim was updated to exim 4.96:
* Move from using the pcre library to pcre2.
* Constification work in the filters module required a major version
bump for the local-scan API. Specifically, the 'headers_charset'
global which is visible via the API is now const and may therefore
not be modified by local-scan code.
* Bug 2819: speed up command-line messages being read in. Previously a
time check was being done for every character; replace that with one
per buffer.
* Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string
sent was prefixed with a length byte.
* Change the SMTP feature name for pipelining connect to be compliant with
RFC 5321. Previously Dovecot (at least) would log errors during
submission.
* Fix macro-definition during '-be' expansion testing. The move to
write-protected store for macros had not accounted for these runtime
additions; fix by removing this protection for '-be' mode.
* Convert all uses of select() to poll().
* Fix use of $sender_host_name in daemon process. When used in certain
main-section options or in a connect ACL, the value from the first ever
connection was never replaced for subsequent connections.
* Bug 2838: Fix for i32lp64 hard-align platforms
* Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
with underbars is given.
* Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.
* Debugging initiated by an ACL control now continues through into routing
and transport processes.
* The 'expand' debug selector now gives more detail, specifically on the
result of expansion operators and items.
* Bug 2751: Fix include_directory in redirect routers. Previously a
bad comparison between the option value and the name of the file to
be included was done, and a mismatch was wrongly identified.
* Support for Berkeley DB versions 1 and 2 is withdrawn.
* When built with NDBM for hints DB's check for nonexistence of a name
supplied as the db file-pair basename.
* Remove the 'allow_insecure_tainted_data' main config option and the
'taint' log_selector.
* Fix static address-list lookups to properly return the matched item.
Previously only the domain part was returned.
* The ${run} expansion item now expands its command string elements after
splitting. Previously it was before; the new ordering makes handling
zero-length arguments simpler.
* Taint-check exec arguments for transport-initiated external processes.
Previously, tainted values could be used. This affects 'pipe', 'lmtp' and
'queryprogram' transport, transport-filter, and ETRN commands.
The ${run} expansion is also affected: in 'preexpand' mode no part of
the command line may be tainted, in default mode the executable name
may not be tainted.
* Fix CHUNKING on a continued-transport. Previously the usabilility of
the facility was not passed across execs, and only the first message
passed over a connection could use BDAT; any further ones using DATA.
* Support the PIPECONNECT facility in the smtp transport when the helo_data
uses $sending_ip_address and an interface is specified.
* OpenSSL: fix transport-required OCSP stapling verification under session
resumption.
* TLS resumption: the key for session lookup in the client now includes
more info that a server could potentially use in configuring a TLS
session, avoiding oferring mismatching sessions to such a server.
* Fix string_copyn() for limit greater than actual string length.
* Bug 2886: GnuTLS: Do not free the cached creds on transport connection
close; it may be needed for a subsequent connection.
* Fix CHUNKING for a second message on a connection when the first was
rejected.
* Fix ${srs_encode ...} to handle an empty sender address, now returning
an empty address.
* Bug 2855: Handle a v4mapped sender address given us by a frontending
proxy.
update to exim 4.95
* includes taintwarn (taintwarn.patch)
* fast-ramp queue run
* native SRS
* TLS resumption
* LMDB lookups with single key
* smtp transport option 'message_linelength_limit'
* optionally ignore lookup caches
* quota checking for appendfile transport during message reception
* sqlite lookups allow a 'file=<path>' option
* lsearch lookups allow a 'ret=full' option
* command line option for the notifier socket
* faster TLS startup
* new main config option 'proxy_protocol_timeout'
* expand 'smtp_accept_max_per_connection'
* log selector 'queue_size_exclusive'
* main config option 'smtp_backlog_monitor'
* main config option 'hosts_require_helo'
* main config option 'allow_insecure_tainted_data'
Patchnames
openSUSE-2024-7
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for exim", title: "Title of the patch", }, { category: "description", text: "This update for exim fixes the following issues:\n\nexim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):\n\n * Fixes for the smtp protocol smuggling (CVE-2023-51766)\n\nexim was updated to exim 4.96:\n\n * Move from using the pcre library to pcre2.\n * Constification work in the filters module required a major version\n bump for the local-scan API. Specifically, the 'headers_charset'\n global which is visible via the API is now const and may therefore\n not be modified by local-scan code.\n * Bug 2819: speed up command-line messages being read in. Previously a\n time check was being done for every character; replace that with one\n per buffer.\n * Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string\n sent was prefixed with a length byte.\n * Change the SMTP feature name for pipelining connect to be compliant with\n RFC 5321. Previously Dovecot (at least) would log errors during\n submission.\n * Fix macro-definition during '-be' expansion testing. The move to\n write-protected store for macros had not accounted for these runtime\n additions; fix by removing this protection for '-be' mode.\n * Convert all uses of select() to poll().\n * Fix use of $sender_host_name in daemon process. When used in certain\n main-section options or in a connect ACL, the value from the first ever\n connection was never replaced for subsequent connections.\n * Bug 2838: Fix for i32lp64 hard-align platforms\n * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value\n with underbars is given.\n * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.\n * Debugging initiated by an ACL control now continues through into routing\n and transport processes.\n * The 'expand' debug selector now gives more detail, specifically on the\n result of expansion operators and items.\n * Bug 2751: Fix include_directory in redirect routers. Previously a\n bad comparison between the option value and the name of the file to\n be included was done, and a mismatch was wrongly identified.\n * Support for Berkeley DB versions 1 and 2 is withdrawn.\n * When built with NDBM for hints DB's check for nonexistence of a name\n supplied as the db file-pair basename.\n * Remove the 'allow_insecure_tainted_data' main config option and the\n 'taint' log_selector.\n * Fix static address-list lookups to properly return the matched item.\n Previously only the domain part was returned.\n * The ${run} expansion item now expands its command string elements after\n splitting. Previously it was before; the new ordering makes handling\n zero-length arguments simpler.\n * Taint-check exec arguments for transport-initiated external processes.\n Previously, tainted values could be used. This affects 'pipe', 'lmtp' and\n 'queryprogram' transport, transport-filter, and ETRN commands.\n The ${run} expansion is also affected: in 'preexpand' mode no part of\n the command line may be tainted, in default mode the executable name\n may not be tainted.\n * Fix CHUNKING on a continued-transport. Previously the usabilility of\n the facility was not passed across execs, and only the first message\n passed over a connection could use BDAT; any further ones using DATA.\n * Support the PIPECONNECT facility in the smtp transport when the helo_data\n uses $sending_ip_address and an interface is specified.\n * OpenSSL: fix transport-required OCSP stapling verification under session\n resumption.\n * TLS resumption: the key for session lookup in the client now includes\n more info that a server could potentially use in configuring a TLS\n session, avoiding oferring mismatching sessions to such a server.\n * Fix string_copyn() for limit greater than actual string length.\n * Bug 2886: GnuTLS: Do not free the cached creds on transport connection\n close; it may be needed for a subsequent connection.\n * Fix CHUNKING for a second message on a connection when the first was\n rejected.\n * Fix ${srs_encode ...} to handle an empty sender address, now returning\n an empty address.\n * Bug 2855: Handle a v4mapped sender address given us by a frontending\n proxy.\n\nupdate to exim 4.95\n\n * includes taintwarn (taintwarn.patch)\n * fast-ramp queue run\n * native SRS\n * TLS resumption\n * LMDB lookups with single key\n * smtp transport option 'message_linelength_limit'\n * optionally ignore lookup caches\n * quota checking for appendfile transport during message reception\n * sqlite lookups allow a 'file=<path>' option\n * lsearch lookups allow a 'ret=full' option\n * command line option for the notifier socket\n * faster TLS startup\n * new main config option 'proxy_protocol_timeout'\n * expand 'smtp_accept_max_per_connection'\n * log selector 'queue_size_exclusive'\n * main config option 'smtp_backlog_monitor'\n * main config option 'hosts_require_helo'\n * main config option 'allow_insecure_tainted_data'", title: "Description of the patch", }, { category: "details", text: "openSUSE-2024-7", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0007-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2024:0007-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2024:0007-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/", }, { category: "self", summary: "SUSE Bug 1218387", url: "https://bugzilla.suse.com/1218387", }, { category: "self", summary: "SUSE CVE CVE-2022-3559 page", url: "https://www.suse.com/security/cve/CVE-2022-3559/", }, { category: "self", summary: "SUSE CVE CVE-2023-42114 page", url: "https://www.suse.com/security/cve/CVE-2023-42114/", }, { category: "self", summary: "SUSE CVE CVE-2023-42115 page", url: "https://www.suse.com/security/cve/CVE-2023-42115/", }, { category: "self", summary: "SUSE CVE CVE-2023-42116 page", url: "https://www.suse.com/security/cve/CVE-2023-42116/", }, { category: "self", summary: "SUSE CVE CVE-2023-42117 page", url: "https://www.suse.com/security/cve/CVE-2023-42117/", }, { category: "self", summary: "SUSE CVE CVE-2023-42119 page", url: "https://www.suse.com/security/cve/CVE-2023-42119/", }, { category: "self", summary: "SUSE CVE CVE-2023-51766 page", url: "https://www.suse.com/security/cve/CVE-2023-51766/", }, ], title: "Security update for exim", tracking: { current_release_date: "2024-01-03T20:12:49Z", generator: { date: "2024-01-03T20:12:49Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:0007-1", initial_release_date: "2024-01-03T20:12:49Z", revision_history: [ { date: "2024-01-03T20:12:49Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.aarch64", product: { name: "exim-4.97.1-bp155.5.9.1.aarch64", product_id: "exim-4.97.1-bp155.5.9.1.aarch64", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.aarch64", product: { name: "eximon-4.97.1-bp155.5.9.1.aarch64", product_id: "eximon-4.97.1-bp155.5.9.1.aarch64", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", product_id: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.ppc64le", product: { name: "exim-4.97.1-bp155.5.9.1.ppc64le", product_id: "exim-4.97.1-bp155.5.9.1.ppc64le", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.ppc64le", product: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le", product_id: "eximon-4.97.1-bp155.5.9.1.ppc64le", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", product_id: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.s390x", product: { name: "exim-4.97.1-bp155.5.9.1.s390x", product_id: "exim-4.97.1-bp155.5.9.1.s390x", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.s390x", product: { name: "eximon-4.97.1-bp155.5.9.1.s390x", product_id: "eximon-4.97.1-bp155.5.9.1.s390x", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.s390x", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x", product_id: "eximstats-html-4.97.1-bp155.5.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.x86_64", product: { name: "exim-4.97.1-bp155.5.9.1.x86_64", product_id: "exim-4.97.1-bp155.5.9.1.x86_64", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.x86_64", product: { name: "eximon-4.97.1-bp155.5.9.1.x86_64", product_id: "eximon-4.97.1-bp155.5.9.1.x86_64", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", product_id: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP5", product: { name: "SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5", }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "exim-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "exim-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", }, product_reference: "exim-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "exim-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximon-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximon-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "exim-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "exim-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", }, product_reference: "exim-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "exim-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximon-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximon-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-3559", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3559", }, ], notes: [ { category: "general", text: "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3559", url: "https://www.suse.com/security/cve/CVE-2022-3559", }, { category: "external", summary: "SUSE Bug 1204427 for CVE-2022-3559", url: "https://bugzilla.suse.com/1204427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2022-3559", }, { cve: "CVE-2023-42114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42114", }, ], notes: [ { category: "general", text: "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42114", url: "https://www.suse.com/security/cve/CVE-2023-42114", }, { category: "external", summary: "SUSE Bug 1215784 for CVE-2023-42114", url: "https://bugzilla.suse.com/1215784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "low", }, ], title: "CVE-2023-42114", }, { cve: "CVE-2023-42115", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42115", }, ], notes: [ { category: "general", text: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42115", url: "https://www.suse.com/security/cve/CVE-2023-42115", }, { category: "external", summary: "SUSE Bug 1215785 for CVE-2023-42115", url: "https://bugzilla.suse.com/1215785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "critical", }, ], title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42116", }, ], notes: [ { category: "general", text: "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42116", url: "https://www.suse.com/security/cve/CVE-2023-42116", }, { category: "external", summary: "SUSE Bug 1215786 for CVE-2023-42116", url: "https://bugzilla.suse.com/1215786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2023-42116", }, { cve: "CVE-2023-42117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42117", }, ], notes: [ { category: "general", text: "Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42117", url: "https://www.suse.com/security/cve/CVE-2023-42117", }, { category: "external", summary: "SUSE Bug 1215787 for CVE-2023-42117", url: "https://bugzilla.suse.com/1215787", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2023-42117", }, { cve: "CVE-2023-42119", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42119", }, ], notes: [ { category: "general", text: "Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.\n. Was ZDI-CAN-17643.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42119", url: "https://www.suse.com/security/cve/CVE-2023-42119", }, { category: "external", summary: "SUSE Bug 1215789 for CVE-2023-42119", url: "https://bugzilla.suse.com/1215789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "low", }, ], title: "CVE-2023-42119", }, { cve: "CVE-2023-51766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51766", }, ], notes: [ { category: "general", text: "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51766", url: "https://www.suse.com/security/cve/CVE-2023-51766", }, { category: "external", summary: "SUSE Bug 1218387 for CVE-2023-51766", url: "https://bugzilla.suse.com/1218387", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "moderate", }, ], title: "CVE-2023-51766", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.