[Git][security-tracker-team/security-tracker][master] Reference followup post for exim4 issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Oct 1 19:58:54 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
92ab0359 by Salvatore Bonaccorso at 2023-10-01T20:57:06+02:00
Reference followup post for exim4 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -451,34 +451,40 @@ CVE-2023-42119 [Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerabili
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3033
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
 CVE-2023-42118 [Exim libspf2 Integer Underflow Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1472/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3032
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
 CVE-2023-42117 [Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3031
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
 CVE-2023-42116 [Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3000
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 CVE-2023-42115 [Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1469/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=2999
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 CVE-2023-42114 [Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3001
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
+	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 CVE-2023-40476 [Integer overflow in H.265 video parser leading to stack overwrite]
 	- gst-plugins-bad1.0 <unfixed> (bug #1053259)
 	- gst-plugins-bad0.10 <removed>



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92ab035985f2e3db254edd9bc7335ce48611eb72

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92ab035985f2e3db254edd9bc7335ce48611eb72
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231001/68438ca3/attachment.htm>


More information about the debian-security-tracker-commits mailing list