Language Selection

English French German Italian Portuguese Spanish

Security Updates

Filed under
Security
  • Security updates for Monday

    Security updates have been issued by CentOS (dovecot, kernel, and qemu-kvm), Debian (cimg, cups, e2fsprogs, exim4, file-roller, golang-1.11, httpie, and wpa), Fedora (curl, ghostscript, ibus, krb5, mod_md, and nbdkit), Mageia (chromium-browser-stable, libheif, and nghttp2), openSUSE (djvulibre, expat, libopenmpt, mosquitto, phpMyAdmin, and webkit2gtk3), Red Hat (nodejs:10), SUSE (gpg2), and Ubuntu (e2fsprogs and exim4).

  • Exim 4.92.3 security release

    Exim 4.92.3 has been released with a fix for CVE-2019-16928, a heap-based buffer overflow in string_vformat that could lead to remote code execution. "The currently known exploit uses a extraordinary long EHLO string to crash the Exim process that is receiving the message. While at this mode of operation Exim already dropped its privileges, other paths to reach the vulnerable code may exist."

  • pam-python: local root escalation (CVE-2019-16729)

    Last week the openSUSE Security Team spent some time to check and review the PAM module from the pam-python project. Main reason for that – to make sure that the source code of the project is secure enough and bug free of course. Badly implemented PAM modules may cause user authentication to always succeed or otherwise badly influence security.

New Critical Exim Flaw Exposes Email Servers to Remote Attacks

  • New Critical Exim Flaw Exposes Email Servers to Remote Attacks — Patch Released

    A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers.
    Exim maintainers today released an urgent security update—Exim version 4.92.3—after publishing an early warning two days ago, giving system administrators an early head-up on its upcoming security patches that affect all versions of the email server software from 4.92 up to and including then-latest version 4.92.2.
    Exim is a widely used, open source mail transfer agent (MTA) developed for Unix-like operating systems like Linux, Mac OSX or Solaris, which runs almost 60 percent of the Internet's email servers today for routing, delivering and receiving email messages.

Critical Exim Flaw Opens Servers to Remote Code Execution

  • Critical Exim Flaw Opens Servers to Remote Code Execution

    A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.

    A patch has been issued for a critical flaw in the Exim email server software, which could potentially open Exim-based servers up to denial of service or remote code execution attacks.

    Exim, which is free software used on Unix-like operating systems (including Linux or Mac OSX), serves as a mail transfer agent that manages mail routing services for organizations. According to a Shodan analysis, Exim is the most used mail transfer agent globally and has over five million internet-facing hosts.

The Register's coverage

  • Stop us if you've heard this one before: Yet another critical flaw threatens Exim servers

    Admins of Linux and Unix boxes running Exim would be well-advised to update the software following the disclosure of another critical security flaw.

    The Exim 4.92.3 patch, released on September 28th, includes a fix to close up the CVE-2019-16928 flaw.

    Discovered by bug-hunters with the QAX A-Team, the vulnerability is caused by a buffer overflow error that occurs when Exim processes an extremely long string in an Extended HELO (EHLO) Extended Simple Mail Transfer Protocol (ESMTP) command message.

    In practice, an attacker could write an exploit into the EHLO message and remotely trigger the bug to get control over the targeted server. So far, no active attacks on the flaw have been reported in the wild.

    "It's a simple coding error, not growing a string by enough," said Jeremy Harris, the Exim dev who patched the flaw in what he described as a simple "one-line fix."

Guess what? You should patch Exim again!

  • Guess what? You should patch Exim again!

    CVE-2019-16928 is heap-based buffer overflow in string_vformat found in string.c, and affects Exim versions 4.92 – 4.92.2 (but not v4.91 or earlier). It was discovered and reported by the QAX A-Team.

    “The flaw can be exploited by an unauthenticated remote attacker who could use a large crafted Extended HELO (EHLO) string to crash the Exim process that receives the message. This could potentially be further exploited to execute arbitrary code on the host,” Tenable researcher Scott Caveza pointed out.

    Exim maintainers say that the currently known exploit uses a extraordinary long EHLO string to crash the Exim process that is receiving the message, but that other paths to reach the vulnerable code may exist.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

''4 Best Lightweight Linux Distros to install on USB Drive for Portable OS

Well, it doesn’t mean the only scenario one requires one of the best Live USB bootable Linux distros when he or she needs to use the computer that is not trustable. There are other situations as well, such as your current system is running Windows and you don’t want to have dual boot on your system, and still want to try out Linux? Then use the USB running Linux system. One of the main reasons that make Linux Distro an extremely portable operating system is the low consumption of RAM, depending upon the OS version or GUI, and support to run in a Live environment. This also beneficial for testing, preparing, backing up, or handling drive of the system that are crashed somehow… Furthermore, the machine without a hard disk can also be used with USB drive Linux OS Although we can install any Linux distro on a USB drive, however, here we will show the best open-source Linux distributions that are light in weight, consume less RAM, and other hardware resources to become a perfect portable OS option for Pen drives. Read more

SUSE/OpenSUSE: OpenSUSE + LibreOffice Conference, ZeroLogon, YaST and More

  • Conference organizers announce schedule and platform registration

    Organizers of the online openSUSE + LibreOffice Conference are pleased to announce that the schedule for the conference is published. All times on the schedule are published in Coordinated Universal Time. The conference will take place from live Oct. 15 to Oct. 17 using the oslo.gonogo.live platform. There are more than 100 talks scheduled, covering the openSUSE and LibreOffice projects. There are talks about open-source projects, cloud and container technologies, embedded devices, community development, translations, marketing, documentation, Future Technologies, Quality Assurance and more.

  • SUSE Addresses “ZeroLogon” Vulnerability

    On September 11, Secura research published a new software vulnerability called “ZeroLogon”, which exploits a protocol weakness in the SMB Netlogon protocol. This vulnerability may affect users of SUSE Linux Enterprise Server running Samba servers in older or non-standard configurations. Attackers could use it to bypass access control to the domain controller.

  • Digest of YaST Development Sprint 108

    In our previous post we reported we were working in some mid-term goals in the areas of AutoYaST and storage management. This time we have more news to share about both, together with some other small YaST improvements.

  • Johann Els on running SUSE Linux Enterprise Server on SAP

Devices With GNU/Linux

  • Raspberry Pi enables world’s smallest iMac
  • Banana Pi BPI-M5

    The Banana Pi BPI-M5 SBC, based on the 2.0GHz quad-core Amlogic S905X3 SoC, features 4GB RAM, 16G eMMC, microSD, HDMI, 3.5mm audio, GbE LAN, 4x USB3.0, and 40-pin Raspberry Pi style expansion.

  • Modules and dev kits run Linux on 2.3-TOPS equipped i.MX8M Plus

    Variscite’s “VAR-SOM-MX8M-PLUS” and smaller “DART-MX8M-PLUS” modules run Linux or Android on NXP’s AI-enabled i.MX8M Plus with up to 4GB LPDDR4, 64GB eMMC, WiFi/BT, and optional dev kits. Variscite has launched some of the first embedded boards to support NXP’s i.MX8M Plus, an up to quad-core, Cortex-A53 SoC running at 1.8GHz and equipped with a 2.3-TOPs Neural Processing Unit (NPU). Variscite’s VAR-SOM-MX8M-PLUS and DART-MX8M-PLUS modules join TechNexion’s Wandboard IMX8M-Plus SBC and the Wandboard IMX8M-Plus EDM SOM module that powers it. Toradex, meanwhile, has teased an upcoming Verdin iMX8M Plus module.

  • DR6018 V2 Embedded WiFi 6 Router Board Adds Support for WiFi 6E and 5G IoT M.2 Cards

    A few months ago we covered DR6018 (aka CP01) WiFi 6 Embedded SBC powered by Qualcomm IPQ6018 processor and offering six Ethernet ports including five Gigabit interfaces and one 2.5 Gbps Ethernet port. Wallys Communications has now informed CNX Software they had a new version of the board called DR6018 V2 with a more compact form factor, support for PoE, as well as optional WiFi 6E and 5G IoT M.2 modules.

  • Epiq Solutions Introduces Matchstiq™ Z3u, a New Radically Small, Field-Ready, Low Profile Software-Defined Radio (SDR) RF Platform Ideal for On-the-Go Signal Processing

    A complete Platform Development Kit (PDK) with Linux board support package (BSP), open API and FPGA reference design source code is available to allow customers to develop their own signal processing applications for Matchstiq Z3u. This PDK leverages the same API and FPGA reference design used with Epiq’s Sidekiq portfolio of SDR modules, providing a familiar interface for existing customers.