Hi,

Cyborg <[email protected]> (Mi 21 Jun 2017 09:17:57 CEST):
> Am 21.06.2017 um 08:07 schrieb Heiko Schlittermann via Exim-users:
> > IF your distribution updated the packaged version of Exim 
> >    OR the underlying system
> >
> > THEN you're safe already and can stop reading.
> >
> >
> 
> As the problem is not inside exim, but in the way, the os handles guard
> pages, the above assumption is WRONG!

Ok. Half wrong. If you have an updated packaged version of Exim, your
Exim can't be abused anymore as a vector. But other (suid?) programs
may.

> You need a patched kernel to be active. IF you are running a server, you
> NEED TO REBOOT your system with a new kernel.

So, to be really safe, you need an updated kernel, right.
(Which implies that you need to reboot after updating the kernel. (I
assume, that our audience knows about that :))

Thank you for pointing out that detail.

-- 
Heiko

Attachment: signature.asc
Description: PGP signature

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to