1
exim4 (4.71-3ubuntu1.1) lucid-security; urgency=low
3
Exim versions up to and including 4.72 are vulnerable to CVE-2010-4345.
4
This is a privilege escalation issue that allows the exim user to gain
5
root privileges by specifying an alternate configuration file using the -C
6
option. The macro override facility (-D) might also be misused for this
9
In reaction to this security vulnerability upstream has made a number of
10
user visible changes. This package includes these changes.
11
---------------------------------------------------------
12
If exim is invoked with the -C or -D option the daemon will not regain
13
root privileges though re-execution. This is usually necessary for local
14
delivery, though. Therefore it is generally not possible anymore to run an
15
exim daemon with -D or -C options.
17
However this version of exim has been built with
18
TRUSTED_CONFIG_LIST=/etc/exim4/trusted_configs. TRUSTED_CONFIG_LIST
19
defines a list of configuration files which are trusted; if a config file
20
is owned by root and matches a pathname in the list, then it may be
21
invoked by the Exim build-time user without Exim relinquishing root
24
As a hotfix to not break existing installations of mailscanner we have
25
also set WHITELIST_D_MACROS=OUTGOING. i.e. it is still possible to start
26
exim with -DOUTGOING while being able to do local deliveries.
28
If you previously were using -D switches you will need to change your
29
setup to use a separate configuration file. The ".include" mechanism
31
---------------------------------------------------------
32
The system filter is run as exim_user instead of root by default. If your
33
setup requies root privileges when running the system filter you will
34
need to set the system_filter_user exim main configuration option.
35
---------------------------------------------------------
37
-- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 08 Feb 2011 11:31:29 -0500
1
39
exim4 (4.60-2) unstable; urgency=low
3
41
The exim4 daemon packages now include a symlink from