[Slackbuilds-users] Exim CVE-2016-1531
Willy Sudiarto Raharjo
willysr at slackbuilds.org
Sun Mar 6 01:13:52 UTC 2016
> A new version of Exim has been released, fixing a vulnerability that
> allows a local privilege escalation. While the Exim from SBo doesn't
> include the vulnerable feature and thus *should* not be affected, the
> download link in the .info file needs editing and an upgrade to the
> current Exim 4.86.2 seems desirable.
>
> If you're still okay with Exim 4.86 you can find the archive at:
>
> ftp://ftp.exim.org/pub/exim/exim4/old/exim-4.86.tar.bz2
>
> If you prefer to upgrade to Exim 4.86.2, simply replace exim.SlackBuild
> and exim.info with the attached files and build. Please note that the new
> version contains changes that might break your existing config. See...
>
> http://article.gmane.org/gmane.mail.exim.announce/168
applied in my branch (updated to 4.86.2)
Thanks
--
Willy Sudiarto Raharjo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <http://lists.slackbuilds.org/pipermail/slackbuilds-users/attachments/20160306/5b94eaec/attachment.asc>
More information about the SlackBuilds-users
mailing list