Debian Security Advisory
DSA-3517-1 exim4 -- security update
- Date Reported:
- 14 Mar 2016
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-1531.
- More information:
A local root privilege escalation vulnerability was found in Exim, Debian's default mail transfer agent, in configurations using the
perl_startupoption (Only Exim via exim4-daemon-heavy enables Perl support).
To address the vulnerability, updated Exim versions clean the complete execution environment by default, affecting Exim and subprocesses such as transports calling other programs, and thus may break existing installations. New configuration options (keep_environment, add_environment) were introduced to adjust this behavior.
More information can be found in the upstream advisory at https://www.exim.org/static/doc/CVE-2016-1531.txt
For the oldstable distribution (wheezy), this problem has been fixed in version 4.80-7+deb7u2.
For the stable distribution (jessie), this problem has been fixed in version 4.84.2-1.
For the testing distribution (stretch), this problem has been fixed in version 4.86.2-1.
For the unstable distribution (sid), this problem has been fixed in version 4.86.2-1.
We recommend that you upgrade your exim4 packages.