Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-3559 (GCVE-0-2022-3559)
Vulnerability from cvelistv5
Published
2022-10-17 00:00
Modified
2025-04-15 13:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Memory Corruption -> CWE-416 Use After Free
Summary
A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | Exim |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:02.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "tags": [ "x_transferred" ], "url": "https://vuldb.com/?id.211073" }, { "tags": [ "x_transferred" ], "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "name": "FEDORA-2022-6125582f45", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "name": "FEDORA-2022-ebb3db782c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "name": "FEDORA-2022-90e08c08e6", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3559", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T17:08:41.116746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T13:27:13.689Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Exim", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Memory Corruption -\u003e CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "url": "https://vuldb.com/?id.211073" }, { "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "name": "FEDORA-2022-6125582f45", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "name": "FEDORA-2022-ebb3db782c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "name": "FEDORA-2022-90e08c08e6", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" } ], "title": "Exim Regex use after free", "x_generator": "vuldb.com" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2022-3559", "datePublished": "2022-10-17T00:00:00.000Z", "dateReserved": "2022-10-17T00:00:00.000Z", "dateUpdated": "2025-04-15T13:27:13.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-3559\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2022-10-17T18:15:12.613\",\"lastModified\":\"2025-05-23T18:30:01.250\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en Exim y se ha clasificado como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del componente Regex Handler. La manipulaci\u00f3n conduce a la utilizaci\u00f3n despu\u00e9s de libre. El nombre del parche es 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. Se recomienda aplicar un parche para solucionar este problema. El identificador VDB-211073 fue asignado a esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.2,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.97\",\"matchCriteriaId\":\"B4E00863-1A11-471A-816C-67E0FA1309A9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}],\"references\":[{\"url\":\"https://bugs.exim.org/show_bug.cgi?id=2915\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.211073\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.exim.org/show_bug.cgi?id=2915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.211073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"title\": \"Exim Regex use after free\", \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2022-11-14T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.\"}], \"affected\": [{\"vendor\": \"unspecified\", \"product\": \"Exim\", \"versions\": [{\"version\": \"n/a\", \"status\": \"affected\"}]}], \"references\": [{\"url\": \"https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2\"}, {\"url\": \"https://vuldb.com/?id.211073\"}, {\"url\": \"https://bugs.exim.org/show_bug.cgi?id=2915\"}, {\"name\": \"FEDORA-2022-6125582f45\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/\"}, {\"name\": \"FEDORA-2022-ebb3db782c\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/\"}, {\"name\": \"FEDORA-2022-90e08c08e6\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\", \"baseScore\": 4.6, \"baseSeverity\": \"MEDIUM\"}}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-119 Memory Corruption -\u003e CWE-416 Use After Free\", \"cweId\": \"CWE-119\"}]}], \"x_generator\": \"vuldb.com\"}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:14:02.041Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://vuldb.com/?id.211073\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugs.exim.org/show_bug.cgi?id=2915\", \"tags\": [\"x_transferred\"]}, {\"name\": \"FEDORA-2022-6125582f45\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/\"}, {\"name\": \"FEDORA-2022-ebb3db782c\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/\"}, {\"name\": \"FEDORA-2022-90e08c08e6\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3559\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-14T17:08:41.116746Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-14T17:08:43.550Z\"}}]}", "cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-3559\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"assignerShortName\": \"VulDB\", \"dateUpdated\": \"2025-04-15T13:27:13.689Z\", \"dateReserved\": \"2022-10-17T00:00:00.000Z\", \"datePublished\": \"2022-10-17T00:00:00.000Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2022:10168-1
Vulnerability from csaf_opensuse
Published
2022-10-30 15:06
Modified
2022-10-30 15:06
Summary
Security update for exim
Notes
Title of the patch
Security update for exim
Description of the patch
This update for exim fixes the following issues:
- CVE-2022-3559: Fixed a use after free in processing of the component Regex Handler (boo#1204427, Bug 2915)
Patchnames
openSUSE-2022-10168
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for exim", "title": "Title of the patch" }, { "category": "description", "text": "This update for exim fixes the following issues:\n\n- CVE-2022-3559: Fixed a use after free in processing of the component Regex Handler (boo#1204427, Bug 2915)\n ", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2022-10168", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10168-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:10168-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI7MWYRHKOFZJKW5J7VZ57IF4CMVLQVV/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:10168-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI7MWYRHKOFZJKW5J7VZ57IF4CMVLQVV/" }, { "category": "self", "summary": "SUSE Bug 1204427", "url": "https://bugzilla.suse.com/1204427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3559 page", "url": "https://www.suse.com/security/cve/CVE-2022-3559/" } ], "title": "Security update for exim", "tracking": { "current_release_date": "2022-10-30T15:06:21Z", "generator": { "date": "2022-10-30T15:06:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:10168-1", "initial_release_date": "2022-10-30T15:06:21Z", "revision_history": [ { "date": "2022-10-30T15:06:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp154.2.3.1.aarch64", "product": { "name": "exim-4.94.2-bp154.2.3.1.aarch64", "product_id": "exim-4.94.2-bp154.2.3.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp154.2.3.1.aarch64", "product": { "name": "eximon-4.94.2-bp154.2.3.1.aarch64", "product_id": "eximon-4.94.2-bp154.2.3.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp154.2.3.1.aarch64", "product": { "name": "eximstats-html-4.94.2-bp154.2.3.1.aarch64", "product_id": "eximstats-html-4.94.2-bp154.2.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp154.2.3.1.ppc64le", "product": { "name": "exim-4.94.2-bp154.2.3.1.ppc64le", "product_id": "exim-4.94.2-bp154.2.3.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.94.2-bp154.2.3.1.ppc64le", "product": { "name": "eximon-4.94.2-bp154.2.3.1.ppc64le", "product_id": "eximon-4.94.2-bp154.2.3.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "product": { "name": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "product_id": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp154.2.3.1.s390x", "product": { "name": "exim-4.94.2-bp154.2.3.1.s390x", "product_id": "exim-4.94.2-bp154.2.3.1.s390x" } }, { "category": "product_version", "name": "eximon-4.94.2-bp154.2.3.1.s390x", "product": { "name": "eximon-4.94.2-bp154.2.3.1.s390x", "product_id": "eximon-4.94.2-bp154.2.3.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp154.2.3.1.s390x", "product": { "name": "eximstats-html-4.94.2-bp154.2.3.1.s390x", "product_id": "eximstats-html-4.94.2-bp154.2.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp154.2.3.1.x86_64", "product": { "name": "exim-4.94.2-bp154.2.3.1.x86_64", "product_id": "exim-4.94.2-bp154.2.3.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp154.2.3.1.x86_64", "product": { "name": "eximon-4.94.2-bp154.2.3.1.x86_64", "product_id": "eximon-4.94.2-bp154.2.3.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp154.2.3.1.x86_64", "product": { "name": "eximstats-html-4.94.2-bp154.2.3.1.x86_64", "product_id": "eximstats-html-4.94.2-bp154.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP4", "product": { "name": "SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4" } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "exim-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "exim-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp154.2.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp154.2.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp154.2.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp154.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3559" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3559", "url": "https://www.suse.com/security/cve/CVE-2022-3559" }, { "category": "external", "summary": "SUSE Bug 1204427 for CVE-2022-3559", "url": "https://bugzilla.suse.com/1204427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp154.2.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp154.2.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp154.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-30T15:06:21Z", "details": "important" } ], "title": "CVE-2022-3559" } ] }
opensuse-su-2022:10191-1
Vulnerability from csaf_opensuse
Published
2022-11-08 19:11
Modified
2022-11-08 19:11
Summary
Security update for exim
Notes
Title of the patch
Security update for exim
Description of the patch
This update for exim fixes the following issues:
- CVE-2022-3559: Fixed use after free in processing of the component Regex Handler (boo#1204427, Bug 2915)
Patchnames
openSUSE-2022-10191
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for exim", "title": "Title of the patch" }, { "category": "description", "text": "This update for exim fixes the following issues:\n\n- CVE-2022-3559: Fixed use after free in processing of the component Regex Handler (boo#1204427, Bug 2915)\n ", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2022-10191", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10191-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:10191-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHI2HMP6DAOZTDSD24DOTAX6F7CVWV26/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:10191-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHI2HMP6DAOZTDSD24DOTAX6F7CVWV26/" }, { "category": "self", "summary": "SUSE Bug 1204427", "url": "https://bugzilla.suse.com/1204427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3559 page", "url": "https://www.suse.com/security/cve/CVE-2022-3559/" } ], "title": "Security update for exim", "tracking": { "current_release_date": "2022-11-08T19:11:45Z", "generator": { "date": "2022-11-08T19:11:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:10191-1", "initial_release_date": "2022-11-08T19:11:45Z", "revision_history": [ { "date": "2022-11-08T19:11:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp153.5.1.aarch64", "product": { "name": "exim-4.94.2-bp153.5.1.aarch64", "product_id": "exim-4.94.2-bp153.5.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp153.5.1.aarch64", "product": { "name": "eximon-4.94.2-bp153.5.1.aarch64", "product_id": "eximon-4.94.2-bp153.5.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp153.5.1.aarch64", "product": { "name": "eximstats-html-4.94.2-bp153.5.1.aarch64", "product_id": "eximstats-html-4.94.2-bp153.5.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp153.5.1.ppc64le", "product": { "name": "exim-4.94.2-bp153.5.1.ppc64le", "product_id": "exim-4.94.2-bp153.5.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.94.2-bp153.5.1.ppc64le", "product": { "name": "eximon-4.94.2-bp153.5.1.ppc64le", "product_id": "eximon-4.94.2-bp153.5.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp153.5.1.ppc64le", "product": { "name": "eximstats-html-4.94.2-bp153.5.1.ppc64le", "product_id": "eximstats-html-4.94.2-bp153.5.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp153.5.1.s390x", "product": { "name": "exim-4.94.2-bp153.5.1.s390x", "product_id": "exim-4.94.2-bp153.5.1.s390x" } }, { "category": "product_version", "name": "eximon-4.94.2-bp153.5.1.s390x", "product": { "name": "eximon-4.94.2-bp153.5.1.s390x", "product_id": "eximon-4.94.2-bp153.5.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp153.5.1.s390x", "product": { "name": "eximstats-html-4.94.2-bp153.5.1.s390x", "product_id": "eximstats-html-4.94.2-bp153.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp153.5.1.x86_64", "product": { "name": "exim-4.94.2-bp153.5.1.x86_64", "product_id": "exim-4.94.2-bp153.5.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp153.5.1.x86_64", "product": { "name": "eximon-4.94.2-bp153.5.1.x86_64", "product_id": "eximon-4.94.2-bp153.5.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp153.5.1.x86_64", "product": { "name": "eximstats-html-4.94.2-bp153.5.1.x86_64", "product_id": "eximstats-html-4.94.2-bp153.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP3", "product": { "name": "SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3" } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.aarch64" }, "product_reference": "exim-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "exim-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.s390x" }, "product_reference": "exim-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.x86_64" }, "product_reference": "exim-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.aarch64" }, "product_reference": "eximon-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.s390x" }, "product_reference": "eximon-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.x86_64" }, "product_reference": "eximon-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.aarch64" }, "product_reference": "exim-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "exim-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.s390x" }, "product_reference": "exim-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp153.5.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.x86_64" }, "product_reference": "exim-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.aarch64" }, "product_reference": "eximon-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.s390x" }, "product_reference": "eximon-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp153.5.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.x86_64" }, "product_reference": "eximon-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp153.5.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp153.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3559" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3559", "url": "https://www.suse.com/security/cve/CVE-2022-3559" }, { "category": "external", "summary": "SUSE Bug 1204427 for CVE-2022-3559", "url": "https://bugzilla.suse.com/1204427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:exim-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximon-4.94.2-bp153.5.1.x86_64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.aarch64", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.s390x", "SUSE Package Hub 15 SP3:eximstats-html-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:exim-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximon-4.94.2-bp153.5.1.x86_64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.aarch64", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.ppc64le", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.s390x", "openSUSE Leap 15.3:eximstats-html-4.94.2-bp153.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-08T19:11:45Z", "details": "important" } ], "title": "CVE-2022-3559" } ] }
opensuse-su-2024:12422-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
exim-4.96-3.1 on GA media
Notes
Title of the patch
exim-4.96-3.1 on GA media
Description of the patch
These are all security issues fixed in the exim-4.96-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12422
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "exim-4.96-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the exim-4.96-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12422", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12422-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3559 page", "url": "https://www.suse.com/security/cve/CVE-2022-3559/" } ], "title": "exim-4.96-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12422-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.96-3.1.aarch64", "product": { "name": "exim-4.96-3.1.aarch64", "product_id": "exim-4.96-3.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.96-3.1.aarch64", "product": { "name": "eximon-4.96-3.1.aarch64", "product_id": "eximon-4.96-3.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.96-3.1.aarch64", "product": { "name": "eximstats-html-4.96-3.1.aarch64", "product_id": "eximstats-html-4.96-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.96-3.1.ppc64le", "product": { "name": "exim-4.96-3.1.ppc64le", "product_id": "exim-4.96-3.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.96-3.1.ppc64le", "product": { "name": "eximon-4.96-3.1.ppc64le", "product_id": "eximon-4.96-3.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.96-3.1.ppc64le", "product": { "name": "eximstats-html-4.96-3.1.ppc64le", "product_id": "eximstats-html-4.96-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.96-3.1.s390x", "product": { "name": "exim-4.96-3.1.s390x", "product_id": "exim-4.96-3.1.s390x" } }, { "category": "product_version", "name": "eximon-4.96-3.1.s390x", "product": { "name": "eximon-4.96-3.1.s390x", "product_id": "eximon-4.96-3.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.96-3.1.s390x", "product": { "name": "eximstats-html-4.96-3.1.s390x", "product_id": "eximstats-html-4.96-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.96-3.1.x86_64", "product": { "name": "exim-4.96-3.1.x86_64", "product_id": "exim-4.96-3.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.96-3.1.x86_64", "product": { "name": "eximon-4.96-3.1.x86_64", "product_id": "eximon-4.96-3.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.96-3.1.x86_64", "product": { "name": "eximstats-html-4.96-3.1.x86_64", "product_id": "eximstats-html-4.96-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.96-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96-3.1.aarch64" }, "product_reference": "exim-4.96-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96-3.1.ppc64le" }, "product_reference": "exim-4.96-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96-3.1.s390x" }, "product_reference": "exim-4.96-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96-3.1.x86_64" }, "product_reference": "exim-4.96-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96-3.1.aarch64" }, "product_reference": "eximon-4.96-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96-3.1.ppc64le" }, "product_reference": "eximon-4.96-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96-3.1.s390x" }, "product_reference": "eximon-4.96-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96-3.1.x86_64" }, "product_reference": "eximon-4.96-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96-3.1.aarch64" }, "product_reference": "eximstats-html-4.96-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96-3.1.ppc64le" }, "product_reference": "eximstats-html-4.96-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96-3.1.s390x" }, "product_reference": "eximstats-html-4.96-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96-3.1.x86_64" }, "product_reference": "eximstats-html-4.96-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3559" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:exim-4.96-3.1.aarch64", "openSUSE Tumbleweed:exim-4.96-3.1.ppc64le", "openSUSE Tumbleweed:exim-4.96-3.1.s390x", "openSUSE Tumbleweed:exim-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximon-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximon-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96-3.1.s390x", "openSUSE Tumbleweed:eximon-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3559", "url": "https://www.suse.com/security/cve/CVE-2022-3559" }, { "category": "external", "summary": "SUSE Bug 1204427 for CVE-2022-3559", "url": "https://bugzilla.suse.com/1204427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:exim-4.96-3.1.aarch64", "openSUSE Tumbleweed:exim-4.96-3.1.ppc64le", "openSUSE Tumbleweed:exim-4.96-3.1.s390x", "openSUSE Tumbleweed:exim-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximon-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximon-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96-3.1.s390x", "openSUSE Tumbleweed:eximon-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:exim-4.96-3.1.aarch64", "openSUSE Tumbleweed:exim-4.96-3.1.ppc64le", "openSUSE Tumbleweed:exim-4.96-3.1.s390x", "openSUSE Tumbleweed:exim-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximon-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximon-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96-3.1.s390x", "openSUSE Tumbleweed:eximon-4.96-3.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3559" } ] }
opensuse-su-2024:0007-1
Vulnerability from csaf_opensuse
Published
2024-01-03 20:12
Modified
2024-01-03 20:12
Summary
Security update for exim
Notes
Title of the patch
Security update for exim
Description of the patch
This update for exim fixes the following issues:
exim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):
* Fixes for the smtp protocol smuggling (CVE-2023-51766)
exim was updated to exim 4.96:
* Move from using the pcre library to pcre2.
* Constification work in the filters module required a major version
bump for the local-scan API. Specifically, the 'headers_charset'
global which is visible via the API is now const and may therefore
not be modified by local-scan code.
* Bug 2819: speed up command-line messages being read in. Previously a
time check was being done for every character; replace that with one
per buffer.
* Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string
sent was prefixed with a length byte.
* Change the SMTP feature name for pipelining connect to be compliant with
RFC 5321. Previously Dovecot (at least) would log errors during
submission.
* Fix macro-definition during '-be' expansion testing. The move to
write-protected store for macros had not accounted for these runtime
additions; fix by removing this protection for '-be' mode.
* Convert all uses of select() to poll().
* Fix use of $sender_host_name in daemon process. When used in certain
main-section options or in a connect ACL, the value from the first ever
connection was never replaced for subsequent connections.
* Bug 2838: Fix for i32lp64 hard-align platforms
* Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
with underbars is given.
* Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.
* Debugging initiated by an ACL control now continues through into routing
and transport processes.
* The 'expand' debug selector now gives more detail, specifically on the
result of expansion operators and items.
* Bug 2751: Fix include_directory in redirect routers. Previously a
bad comparison between the option value and the name of the file to
be included was done, and a mismatch was wrongly identified.
* Support for Berkeley DB versions 1 and 2 is withdrawn.
* When built with NDBM for hints DB's check for nonexistence of a name
supplied as the db file-pair basename.
* Remove the 'allow_insecure_tainted_data' main config option and the
'taint' log_selector.
* Fix static address-list lookups to properly return the matched item.
Previously only the domain part was returned.
* The ${run} expansion item now expands its command string elements after
splitting. Previously it was before; the new ordering makes handling
zero-length arguments simpler.
* Taint-check exec arguments for transport-initiated external processes.
Previously, tainted values could be used. This affects 'pipe', 'lmtp' and
'queryprogram' transport, transport-filter, and ETRN commands.
The ${run} expansion is also affected: in 'preexpand' mode no part of
the command line may be tainted, in default mode the executable name
may not be tainted.
* Fix CHUNKING on a continued-transport. Previously the usabilility of
the facility was not passed across execs, and only the first message
passed over a connection could use BDAT; any further ones using DATA.
* Support the PIPECONNECT facility in the smtp transport when the helo_data
uses $sending_ip_address and an interface is specified.
* OpenSSL: fix transport-required OCSP stapling verification under session
resumption.
* TLS resumption: the key for session lookup in the client now includes
more info that a server could potentially use in configuring a TLS
session, avoiding oferring mismatching sessions to such a server.
* Fix string_copyn() for limit greater than actual string length.
* Bug 2886: GnuTLS: Do not free the cached creds on transport connection
close; it may be needed for a subsequent connection.
* Fix CHUNKING for a second message on a connection when the first was
rejected.
* Fix ${srs_encode ...} to handle an empty sender address, now returning
an empty address.
* Bug 2855: Handle a v4mapped sender address given us by a frontending
proxy.
update to exim 4.95
* includes taintwarn (taintwarn.patch)
* fast-ramp queue run
* native SRS
* TLS resumption
* LMDB lookups with single key
* smtp transport option 'message_linelength_limit'
* optionally ignore lookup caches
* quota checking for appendfile transport during message reception
* sqlite lookups allow a 'file=<path>' option
* lsearch lookups allow a 'ret=full' option
* command line option for the notifier socket
* faster TLS startup
* new main config option 'proxy_protocol_timeout'
* expand 'smtp_accept_max_per_connection'
* log selector 'queue_size_exclusive'
* main config option 'smtp_backlog_monitor'
* main config option 'hosts_require_helo'
* main config option 'allow_insecure_tainted_data'
Patchnames
openSUSE-2024-7
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for exim", "title": "Title of the patch" }, { "category": "description", "text": "This update for exim fixes the following issues:\n\nexim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):\n\n * Fixes for the smtp protocol smuggling (CVE-2023-51766)\n\nexim was updated to exim 4.96:\n\n * Move from using the pcre library to pcre2.\n * Constification work in the filters module required a major version\n bump for the local-scan API. Specifically, the \u0027headers_charset\u0027\n global which is visible via the API is now const and may therefore\n not be modified by local-scan code.\n * Bug 2819: speed up command-line messages being read in. Previously a\n time check was being done for every character; replace that with one\n per buffer.\n * Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string\n sent was prefixed with a length byte.\n * Change the SMTP feature name for pipelining connect to be compliant with\n RFC 5321. Previously Dovecot (at least) would log errors during\n submission.\n * Fix macro-definition during \u0027-be\u0027 expansion testing. The move to\n write-protected store for macros had not accounted for these runtime\n additions; fix by removing this protection for \u0027-be\u0027 mode.\n * Convert all uses of select() to poll().\n * Fix use of $sender_host_name in daemon process. When used in certain\n main-section options or in a connect ACL, the value from the first ever\n connection was never replaced for subsequent connections.\n * Bug 2838: Fix for i32lp64 hard-align platforms\n * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value\n with underbars is given.\n * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.\n * Debugging initiated by an ACL control now continues through into routing\n and transport processes.\n * The \u0027expand\u0027 debug selector now gives more detail, specifically on the\n result of expansion operators and items.\n * Bug 2751: Fix include_directory in redirect routers. Previously a\n bad comparison between the option value and the name of the file to\n be included was done, and a mismatch was wrongly identified.\n * Support for Berkeley DB versions 1 and 2 is withdrawn.\n * When built with NDBM for hints DB\u0027s check for nonexistence of a name\n supplied as the db file-pair basename.\n * Remove the \u0027allow_insecure_tainted_data\u0027 main config option and the\n \u0027taint\u0027 log_selector.\n * Fix static address-list lookups to properly return the matched item.\n Previously only the domain part was returned.\n * The ${run} expansion item now expands its command string elements after\n splitting. Previously it was before; the new ordering makes handling\n zero-length arguments simpler.\n * Taint-check exec arguments for transport-initiated external processes.\n Previously, tainted values could be used. This affects \u0027pipe\u0027, \u0027lmtp\u0027 and\n \u0027queryprogram\u0027 transport, transport-filter, and ETRN commands.\n The ${run} expansion is also affected: in \u0027preexpand\u0027 mode no part of\n the command line may be tainted, in default mode the executable name\n may not be tainted.\n * Fix CHUNKING on a continued-transport. Previously the usabilility of\n the facility was not passed across execs, and only the first message\n passed over a connection could use BDAT; any further ones using DATA.\n * Support the PIPECONNECT facility in the smtp transport when the helo_data\n uses $sending_ip_address and an interface is specified.\n * OpenSSL: fix transport-required OCSP stapling verification under session\n resumption.\n * TLS resumption: the key for session lookup in the client now includes\n more info that a server could potentially use in configuring a TLS\n session, avoiding oferring mismatching sessions to such a server.\n * Fix string_copyn() for limit greater than actual string length.\n * Bug 2886: GnuTLS: Do not free the cached creds on transport connection\n close; it may be needed for a subsequent connection.\n * Fix CHUNKING for a second message on a connection when the first was\n rejected.\n * Fix ${srs_encode ...} to handle an empty sender address, now returning\n an empty address.\n * Bug 2855: Handle a v4mapped sender address given us by a frontending\n proxy.\n\nupdate to exim 4.95\n\n * includes taintwarn (taintwarn.patch)\n * fast-ramp queue run\n * native SRS\n * TLS resumption\n * LMDB lookups with single key\n * smtp transport option \u0027message_linelength_limit\u0027\n * optionally ignore lookup caches\n * quota checking for appendfile transport during message reception\n * sqlite lookups allow a \u0027file=\u003cpath\u003e\u0027 option\n * lsearch lookups allow a \u0027ret=full\u0027 option\n * command line option for the notifier socket\n * faster TLS startup\n * new main config option \u0027proxy_protocol_timeout\u0027\n * expand \u0027smtp_accept_max_per_connection\u0027\n * log selector \u0027queue_size_exclusive\u0027\n * main config option \u0027smtp_backlog_monitor\u0027\n * main config option \u0027hosts_require_helo\u0027\n * main config option \u0027allow_insecure_tainted_data\u0027", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2024-7", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0007-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:0007-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:0007-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/" }, { "category": "self", "summary": "SUSE Bug 1218387", "url": "https://bugzilla.suse.com/1218387" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3559 page", "url": "https://www.suse.com/security/cve/CVE-2022-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42114 page", "url": "https://www.suse.com/security/cve/CVE-2023-42114/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42115 page", "url": "https://www.suse.com/security/cve/CVE-2023-42115/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42116 page", "url": "https://www.suse.com/security/cve/CVE-2023-42116/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42117 page", "url": "https://www.suse.com/security/cve/CVE-2023-42117/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42119 page", "url": "https://www.suse.com/security/cve/CVE-2023-42119/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51766 page", "url": "https://www.suse.com/security/cve/CVE-2023-51766/" } ], "title": "Security update for exim", "tracking": { "current_release_date": "2024-01-03T20:12:49Z", "generator": { "date": "2024-01-03T20:12:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:0007-1", "initial_release_date": "2024-01-03T20:12:49Z", "revision_history": [ { "date": "2024-01-03T20:12:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "exim-4.97.1-bp155.5.9.1.aarch64", "product_id": "exim-4.97.1-bp155.5.9.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64", "product_id": "eximon-4.97.1-bp155.5.9.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le", "product_id": "exim-4.97.1-bp155.5.9.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le", "product_id": "eximon-4.97.1-bp155.5.9.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.s390x", "product": { "name": "exim-4.97.1-bp155.5.9.1.s390x", "product_id": "exim-4.97.1-bp155.5.9.1.s390x" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.s390x", "product": { "name": "eximon-4.97.1-bp155.5.9.1.s390x", "product_id": "eximon-4.97.1-bp155.5.9.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "exim-4.97.1-bp155.5.9.1.x86_64", "product_id": "exim-4.97.1-bp155.5.9.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64", "product_id": "eximon-4.97.1-bp155.5.9.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP5", "product": { "name": "SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5" } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "exim-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "exim-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "exim-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "exim-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3559" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3559", "url": "https://www.suse.com/security/cve/CVE-2022-3559" }, { "category": "external", "summary": "SUSE Bug 1204427 for CVE-2022-3559", "url": "https://bugzilla.suse.com/1204427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "important" } ], "title": "CVE-2022-3559" }, { "cve": "CVE-2023-42114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42114" } ], "notes": [ { "category": "general", "text": "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42114", "url": "https://www.suse.com/security/cve/CVE-2023-42114" }, { "category": "external", "summary": "SUSE Bug 1215784 for CVE-2023-42114", "url": "https://bugzilla.suse.com/1215784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "moderate" } ], "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42115" } ], "notes": [ { "category": "general", "text": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42115", "url": "https://www.suse.com/security/cve/CVE-2023-42115" }, { "category": "external", "summary": "SUSE Bug 1215785 for CVE-2023-42115", "url": "https://bugzilla.suse.com/1215785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "important" } ], "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42116" } ], "notes": [ { "category": "general", "text": "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42116", "url": "https://www.suse.com/security/cve/CVE-2023-42116" }, { "category": "external", "summary": "SUSE Bug 1215786 for CVE-2023-42116", "url": "https://bugzilla.suse.com/1215786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "critical" } ], "title": "CVE-2023-42116" }, { "cve": "CVE-2023-42117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42117" } ], "notes": [ { "category": "general", "text": "Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42117", "url": "https://www.suse.com/security/cve/CVE-2023-42117" }, { "category": "external", "summary": "SUSE Bug 1215787 for CVE-2023-42117", "url": "https://bugzilla.suse.com/1215787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "critical" } ], "title": "CVE-2023-42117" }, { "cve": "CVE-2023-42119", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42119" } ], "notes": [ { "category": "general", "text": "Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.\n. Was ZDI-CAN-17643.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42119", "url": "https://www.suse.com/security/cve/CVE-2023-42119" }, { "category": "external", "summary": "SUSE Bug 1215789 for CVE-2023-42119", "url": "https://bugzilla.suse.com/1215789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "low" } ], "title": "CVE-2023-42119" }, { "cve": "CVE-2023-51766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51766" } ], "notes": [ { "category": "general", "text": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51766", "url": "https://www.suse.com/security/cve/CVE-2023-51766" }, { "category": "external", "summary": "SUSE Bug 1218387 for CVE-2023-51766", "url": "https://bugzilla.suse.com/1218387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "moderate" } ], "title": "CVE-2023-51766" } ] }
gsd-2022-3559
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-3559", "id": "GSD-2022-3559", "references": [ "https://www.suse.com/security/cve/CVE-2022-3559.html", "https://ubuntu.com/security/CVE-2022-3559", "https://alas.aws.amazon.com/cve/html/CVE-2022-3559.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-3559" ], "details": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "id": "GSD-2022-3559", "modified": "2023-12-13T01:19:39.784741Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2022-3559", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Exim Regex use after free" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Exim", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "4.6", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119 Memory Corruption -\u003e CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2", "refsource": "MISC", "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "name": "https://vuldb.com/?id.211073", "refsource": "MISC", "url": "https://vuldb.com/?id.211073" }, { "name": "https://bugs.exim.org/show_bug.cgi?id=2915", "refsource": "MISC", "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "name": "FEDORA-2022-6125582f45", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "name": "FEDORA-2022-ebb3db782c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "name": "FEDORA-2022-90e08c08e6", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:exim:exim:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2022-3559" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://vuldb.com/?id.211073", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.211073" }, { "name": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "name": "https://bugs.exim.org/show_bug.cgi?id=2915", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "name": "FEDORA-2022-6125582f45", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "name": "FEDORA-2022-ebb3db782c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "name": "FEDORA-2022-90e08c08e6", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-11-16T18:14Z", "publishedDate": "2022-10-17T18:15Z" } } }
ghsa-86wj-xg3c-r8gx
Vulnerability from github
Published
2022-10-17 19:00
Modified
2025-05-23 18:31
Severity ?
VLAI Severity ?
Details
A vulnerability was found in Exim and classified as critical. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
{ "affected": [], "aliases": [ "CVE-2022-3559" ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-10-17T18:15:00Z", "severity": "HIGH" }, "details": "A vulnerability was found in Exim and classified as critical. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "id": "GHSA-86wj-xg3c-r8gx", "modified": "2025-05-23T18:31:51Z", "published": "2022-10-17T19:00:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3559" }, { "type": "WEB", "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "type": "WEB", "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR" }, { "type": "WEB", "url": "https://vuldb.com/?id.211073" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2022-1757
Vulnerability from csaf_certbund
Published
2022-10-17 22:00
Modified
2024-10-28 23:00
Summary
Exim: Schwachstelle ermöglicht nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Exim ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Exim ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1757 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1757.json" }, { "category": "self", "summary": "WID-SEC-2022-1757 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1757" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2022-3559 vom 2022-10-17", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3559" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5741-1 vom 2022-11-24", "url": "https://ubuntu.com/security/notices/USN-5741-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1662 vom 2023-01-24", "url": "https://alas.aws.amazon.com/ALAS-2023-1662.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3938 vom 2024-10-29", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00029.html" } ], "source_lang": "en-US", "title": "Exim: Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff", "tracking": { "current_release_date": "2024-10-28T23:00:00.000+00:00", "generator": { "date": "2024-10-29T09:07:26.122+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2022-1757", "initial_release_date": "2022-10-17T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-20T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: FEDORA-2022-6125582F45, FEDORA-2022-EBB3DB782C, FEDORA-2022-4970291DD3" }, { "date": "2022-11-24T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-24T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Exim", "product": { "name": "Open Source Exim", "product_id": "T007959", "product_identification_helper": { "cpe": "cpe:/a:exim:exim:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim in der Komponente \"Regex Handler\" aufgrund eines \"use after free\" Fehlers. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363" ] }, "release_date": "2022-10-17T22:00:00.000+00:00", "title": "CVE-2022-3559" } ] }
fkie_cve-2022-3559
Vulnerability from fkie_nvd
Published
2022-10-17 18:15
Modified
2025-05-23 18:30
Severity ?
4.6 (Medium) - CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://bugs.exim.org/show_bug.cgi?id=2915 | Patch, Vendor Advisory | |
cna@vuldb.com | https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2 | Patch, Vendor Advisory | |
cna@vuldb.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/ | Mailing List, Third Party Advisory | |
cna@vuldb.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/ | Mailing List, Third Party Advisory | |
cna@vuldb.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/ | Mailing List, Third Party Advisory | |
cna@vuldb.com | https://vuldb.com/?id.211073 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.exim.org/show_bug.cgi?id=2915 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.211073 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
exim | exim | * | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E00863-1A11-471A-816C-67E0FA1309A9", "versionEndExcluding": "4.97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en Exim y se ha clasificado como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del componente Regex Handler. La manipulaci\u00f3n conduce a la utilizaci\u00f3n despu\u00e9s de libre. El nombre del parche es 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. Se recomienda aplicar un parche para solucionar este problema. El identificador VDB-211073 fue asignado a esta vulnerabilidad" } ], "id": "CVE-2022-3559", "lastModified": "2025-05-23T18:30:01.250", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-17T18:15:12.613", "references": [ { "source": "cna@vuldb.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "source": "cna@vuldb.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" }, { "source": "cna@vuldb.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "source": "cna@vuldb.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.211073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://bugs.exim.org/show_bug.cgi?id=2915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.211073" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cna@vuldb.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…