Your message dated Sun, 25 Sep 2016 16:55:01 +0000
with message-id <[email protected]>
and subject line Bug#832442: fixed in exim4 4.88~RC1-1
has caused the Debian Bug report #832442,
regarding exim4: CVE-2016-1238 fix
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
832442: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832442
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: exim4
Version: 4.87-3
Severity: important
Hi maintainer,
An update for this package has been released as part of our handling for
the issue described below. This fixes an instance of the dynamic module
loading vulnerability alluded to.
I attach the patch I applied for jessie; please could you review this
and apply something similar for sid?
Thanks,
Dominic.
----- Forwarded message from Salvatore Bonaccorso <[email protected]> -----
Date: Mon, 25 Jul 2016 14:18:38 +0000
From: Salvatore Bonaccorso <[email protected]>
To: [email protected]
Subject: [SECURITY] [DSA 3628-1] perl security update
-------------------------------------------------------------------------
Debian Security Advisory DSA-3628-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 25, 2016 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : perl
CVE ID : CVE-2016-1238 CVE-2016-6185
Debian Bug : 829578
Multiple vulnerabilities were discovered in the implementation of the
Perl programming language. The Common Vulnerabilities and Exposures
project identifies the following problems:
CVE-2016-1238
John Lightsey and Todd Rinaldo reported that the opportunistic
loading of optional modules can make many programs unintentionally
load code from the current working directory (which might be changed
to another directory without the user realising) and potentially
leading to privilege escalation, as demonstrated in Debian with
certain combinations of installed packages.
The problem relates to Perl loading modules from the includes
directory array ("@INC") in which the last element is the current
directory ("."). That means that, when "perl" wants to load a module
(during first compilation or during lazy loading of a module in run-
time), perl will look for the module in the current directory at the
end, since '.' is the last include directory in its array of include
directories to seek. The issue is with requiring libraries that are
in "." but are not otherwise installed.
With this update several modules which are known to be vulnerable
are updated to not load modules from current directory.
Additionally the update allows configurable removal of "." from @INC
in /etc/perl/sitecustomize.pl for a transitional period. It is
recommended to enable this setting if the possible breakage for a
specific site has been evaluated. Problems in packages provided in
Debian resulting from the switch to the removal of '.' from @INC
should be reported to the Perl maintainers at
[email protected] .
It is planned to switch to the default removal of '.' in @INC in a
subsequent update to perl via a point release if possible, and in
any case for the upcoming stable release Debian 9 (stretch).
CVE-2016-6185
It was discovered that XSLoader, a core module from Perl to
dynamically load C libraries into Perl code, could load shared
library from incorrect location. XSLoader uses caller() information
to locate the .so file to load. This can be incorrect if
XSLoader::load() is called in a string eval. An attacker can take
advantage of this flaw to execute arbitrary code.
For the stable distribution (jessie), these problems have been fixed in
version 5.20.2-3+deb8u6. Additionally this update includes the
following updated packages to address optional module loading
vulnerabilities related to CVE-2016-1238, or to address build failures
which occur when '.' is removed from @INC:
- cdbs 0.4.130+deb8u1
- debhelper 9.20150101+deb8u2
- devscripts 2.15.3+deb8u1
- exim4 4.84.2-2+deb8u1
- libintl-perl 1.23-1+deb8u1
- libmime-charset-perl 1.011.1-1+deb8u2
- libmime-encwords-perl 1.014.3-1+deb8u1
- libmodule-build-perl 0.421000-2+deb8u1
- libnet-dns-perl 0.81-2+deb8u1
- libsys-syslog-perl 0.33-1+deb8u1
- libunicode-linebreak-perl 0.0.20140601-2+deb8u2
We recommend that you upgrade your perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
----- End forwarded message -----
diff -Nru exim4-4.84.2/debian/changelog exim4-4.84.2/debian/changelog
--- exim4-4.84.2/debian/changelog 2016-03-13 17:45:53.000000000 +0000
+++ exim4-4.84.2/debian/changelog 2016-07-24 22:45:57.000000000 +0100
@@ -1,3 +1,10 @@
+exim4 (4.84.2-1+deb8u1) jessie-security; urgency=high
+
+ * Non-maintainer upload.
+ * eximstats: Remove . from @INC [CVE-2016-1238]
+
+ -- Dominic Hargreaves <[email protected]> Sun, 24 Jul 2016 22:35:48 +0100
+
exim4 (4.84.2-1) jessie-security; urgency=high
* New upstream security release.
diff -Nru exim4-4.84.2/debian/patches/90_CVE-2016-1238.diff exim4-4.84.2/debian/patches/90_CVE-2016-1238.diff
--- exim4-4.84.2/debian/patches/90_CVE-2016-1238.diff 1970-01-01 01:00:00.000000000 +0100
+++ exim4-4.84.2/debian/patches/90_CVE-2016-1238.diff 2016-07-24 22:36:32.000000000 +0100
@@ -0,0 +1,11 @@
+--- a/src/eximstats.src 2016-07-24 22:29:53.000000000 +0100
++++ b/src/eximstats.src 2016-07-24 22:33:49.763365395 +0100
+@@ -550,6 +550,8 @@
+
+ =cut
+
++BEGIN { pop @INC if $INC[-1] eq '.' }
++
+ use integer;
+ use strict;
+ use IO::File;
diff -Nru exim4-4.84.2/debian/patches/series exim4-4.84.2/debian/patches/series
--- exim4-4.84.2/debian/patches/series 2016-03-13 17:45:53.000000000 +0000
+++ exim4-4.84.2/debian/patches/series 2016-07-24 22:34:36.000000000 +0100
@@ -18,3 +18,4 @@
87_Fix-transport-results-pipe-for-multiple-recipients-c.patch
89_01_only_warn_on_nonempty_environment.diff
89_02_Store-the-initial-working-directory.diff
+90_CVE-2016-1238.diff
--- End Message ---
--- Begin Message ---
Source: exim4
Source-Version: 4.88~RC1-1
We believe that the bug you reported is fixed in the latest version of
exim4, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andreas Metzler <[email protected]> (supplier of updated exim4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 25 Sep 2016 15:44:00 +0200
Source: exim4
Binary: exim4-base exim4-config exim4-daemon-light exim4 exim4-daemon-heavy
eximon4 exim4-dbg exim4-daemon-light-dbg exim4-daemon-heavy-dbg exim4-dev
Architecture: source
Version: 4.88~RC1-1
Distribution: experimental
Urgency: low
Maintainer: Exim4 Maintainers <[email protected]>
Changed-By: Andreas Metzler <[email protected]>
Closes: 823855 832442 834699
Description:
exim4-base - support files for all Exim MTA (v4) packages
exim4-config - configuration for the Exim MTA (v4)
exim4-daemon-heavy-dbg - debugging symbols for the Exim MTA "heavy" daemon
exim4-daemon-heavy - Exim MTA (v4) daemon with extended features, including
exiscan-ac
exim4-daemon-light-dbg - debugging symbols for the Exim MTA "light" daemon
exim4-daemon-light - lightweight Exim MTA (v4) daemon
exim4-dbg - debugging symbols for the Exim MTA (utilities)
exim4-dev - header files for the Exim MTA (v4) packages
exim4 - metapackage to ease Exim MTA (v4) installation
eximon4 - monitor application for the Exim MTA (v4) (X11 interface)
Changes:
exim4 (4.88~RC1-1) experimental; urgency=low
.
* Drop reference to removed (in 4.80-7) "what"-option in init script usage
message. (Thanks, Calum Mackay!) Closes: #823855
* 92_CVE-2016-1238.diff: eximstats: Remove . from @INC [CVE-2016-1238]
Closes: #832442
* [lintian] update-exim4.conf.8 - fix typo.
* [lintian] Drop unused override binaries-have-file-conflict.
* B-d on default-libmysqlclient-dev.
* New upstream version.
+ Refresh patches: 31_eximmanpage.dpatch 32_exim4.dpatch 35_install.dpatch
50_localscan_dlopen.dpatch
+ Drop superfluous patches.
71_01_configure.default-nice-message-for-overlong-lines-Bu.patch
71_02_Delivery-quieten-smtp-transport-conn-reuse-vs.-deliv.patch
71_03_Avoid-exposing-passwords-in-log-on-failing-ldap-look.patch
71_04_Avoid-exposing-passwords-in-log-on-failing-ldap-look.patch
+ Fix crash in VRFY handling when handed an unqualified name
(lacking @domain). Apply the same qualification processing as RCPT.
Closes: #834699
+ Fix a possible security hole, wherein a process operating with the Exim
UID can gain a root shell. Credit to http://www.halfdog.net/ for
discovery and writeup. LP: #1580454
* [lintian] exim4-config_files.5 - fix typo.
Checksums-Sha1:
9e5eee99457f06cdf8717c0727bb925660d48e52 3039 exim4_4.88~RC1-1.dsc
504a4d3fbe48aa8ec2c0d4a325a9f3e622b3dbc2 1805625 exim4_4.88~RC1.orig.tar.bz2
e71d2d918f3b0af1ad92a458f9b9471cd5bb1008 455 exim4_4.88~RC1.orig.tar.bz2.asc
a64c4e309d5920823c0b4e883ce679cb6b6813ca 442208 exim4_4.88~RC1-1.debian.tar.xz
Checksums-Sha256:
834ffcbd66a897ca28a5bf626936341916647e7a68676be3fe52485c5b058a52 3039
exim4_4.88~RC1-1.dsc
025362da42722a6f67204afc042641085ee17c5aee75ea06cc2f8c1e072e8630 1805625
exim4_4.88~RC1.orig.tar.bz2
4a5142d147e6cdce2c2e5dad96c8fc8d12300ef991e4c8e5763f27d3afed8d9b 455
exim4_4.88~RC1.orig.tar.bz2.asc
938e1ffde572597bd8d36442b8a73a1994dd83122e2e6152993a44fe1572adaf 442208
exim4_4.88~RC1-1.debian.tar.xz
Files:
76b15dc60b12525aa0463b8394755da1 3039 mail standard exim4_4.88~RC1-1.dsc
593c6a2338a7032c6c4063f823d0fef9 1805625 mail standard
exim4_4.88~RC1.orig.tar.bz2
b6633dc4d8ae66a1484397f82c36e9b1 455 mail standard
exim4_4.88~RC1.orig.tar.bz2.asc
ac913070da6b31d71a787b502ffa05b0 442208 mail standard
exim4_4.88~RC1-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=TfKH
-----END PGP SIGNATURE-----
--- End Message ---