This is about a perl security issue that was not accepted directly into exim in July/August 2016.

Patch 915 does not apply cleanly to exim 4.89_RC3
(which adds "use warnings;" in the same place the change made by 915).
A suitable alternative is:

--- src/eximstats.src.CVE-2016-1238     2017-02-10 02:50:40.000000000 +0000
+++ src/eximstats.src   2017-02-10 12:54:28.235197704 +0000
@@ -547,6 +547,8 @@

 =cut

+BEGIN { pop @INC if $INC[-1] eq '.' }
+
 use warnings;
 use integer;
 use strict;



On Mon, 25 Jul 2016, [email protected] wrote:

https://bugs.exim.org/show_bug.cgi?id=1864

           Bug ID: 1864
          Summary: CVE-2016-1238: Important unsafe module load path flaw
          Product: Exim
          Version: 4.87
         Hardware: x86
               OS: Linux
           Status: NEW
         Severity: bug
         Priority: medium
        Component: Eximstats
         Assignee: [email protected]
         Reporter: [email protected]
               CC: [email protected]

Created attachment 915
 --> https://bugs.exim.org/attachment.cgi?id=915&action=edit
patch used by Debian 4.84.2-1+deb8u1

Hello,

as part of fixing CVE-2016-1238 in DSA 3628-1 Debian has applied the attached
patch to eximstats.

Please review and apply. TIA


--
## List details at https://lists.exim.org/mailman/listinfo/exim-dev Exim 
details at http://www.exim.org/ ##

Reply via email to