[Git][security-tracker-team/security-tracker][master] Clarify status for exim4 issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Oct 1 20:45:56 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4df512d1 by Salvatore Bonaccorso at 2023-10-01T21:45:09+02:00
Clarify status for exim4 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -449,25 +449,27 @@ CVE-2023-38870 (A SQL injection vulnerability exists in gugoan Economizzer commi
 	NOT-FOR-US: gugoan's Economizzer
 CVE-2023-42119 [Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability]
 	- exim4 <unfixed>
+	[bookworm] - exim4 <no-dsa> (Minor issue; use Exim4 with a trustworthy DNS resolver able to validate the data according to the DNS record types)
+	[bullseye] - exim4 <no-dsa> (Minor issue; use Exim4 with a trustworthy DNS resolver able to validate the data according to the DNS record types)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3033
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
-	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
 CVE-2023-42118 [Exim libspf2 Integer Underflow Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1472/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3032
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
-	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
+	NOTE: From upstream: Issue is debatable for Exim4 and should be filled against libspf2.
 CVE-2023-42117 [Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
+	[bookworm] - exim4 <no-dsa> (Only an issue if Exim4 run behind an untrusted proxy-protocol proxy)
+	[bullseye] - exim4 <no-dsa> (Only an issue if Exim4 run behind an untrusted proxy-protocol proxy)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
 	NOTE: https://bugs.exim.org/show_bug.cgi?id=3031
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
-	NOTE: From upstream: Issue is debatable or miss information upstream needs to address the issue.
 CVE-2023-42116 [Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1470/



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4df512d175ad58a3b606b2e5a391254136235c07

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4df512d175ad58a3b606b2e5a391254136235c07
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231001/f4a587ab/attachment.htm>


More information about the debian-security-tracker-commits mailing list