Opened 4 days ago

Last modified 4 days ago

#21336 assigned enhancement

exim-4.98.2

Reported by: Douglas R. Reno Owned by: Douglas R. Reno
Priority: elevated Milestone: 12.4
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version

Contains a fix for CVE-2025-30232 - allowing for a potential privilege escalation.

Security advisory:

# CVE 2025-30232

## Timeline

- 2025/03/13 Report received
- 2025/03/18 ACK sent to reporter
- 2025/03/19 CVE assigned
- 2025/03/19 Distros heads-up mail, to <distros@vs.openwall.org> and <exim-maintainers@lists.exim.org>
- 2025/03/21 14:00 UTC Security Release available for (only) Distros
- 2025/03/25 14:00 UTC Public heads-up notification, to <exim-announce@lists.exim.org>
- 2025/03/26 14:00 UTC Published the changes on https://code.exim.org/exim/exim.git


## Details

A use-after-free is possible, with potential for privilege escalation.

The following conditions have to be met for being vulnerable:

- Exim Version
     - 4.96
     - 4.97
     - 4.98
     - 4.98.1
 - Command-line access

## Acknowledgements

Thanks to Trend Micro for reporting this issue in a responsible manner.
- Ref: ZDI-CAN-26250
- Email: <zdi-disclosures@trendmicro.com>

Release notes:

Exim version 4.98.2
-------------------

This is a security release, addressing CVE-2025-30232

JH/01 Fix use-after-free notified by Trend Micro (ref: ZDI-CAN-26250).
      Null out debug_pretrigger_buf pointer before freeing the buffer;
      the use of this buffer by the storage management checks the pointer
      for non-null before using it.

Change History (1)

comment:1 by Douglas R. Reno, 4 days ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned
Note: See TracTickets for help on using tickets.