[Slackbuilds-users] Exim CVE-2016-1531

Willy Sudiarto Raharjo willysr at slackbuilds.org
Sun Mar 6 01:13:52 UTC 2016


> A new version of Exim has been released, fixing a vulnerability that 
> allows a local privilege escalation. While the Exim from SBo doesn't 
> include the vulnerable feature and thus *should* not be affected, the 
> download link in the .info file needs editing and an upgrade to the 
> current Exim 4.86.2 seems desirable.
> 
> If you're still okay with Exim 4.86 you can find the archive at:
> 
>   ftp://ftp.exim.org/pub/exim/exim4/old/exim-4.86.tar.bz2
> 
> If you prefer to upgrade to Exim 4.86.2, simply replace exim.SlackBuild 
> and exim.info with the attached files and build. Please note that the new 
> version contains changes that might break your existing config. See...
> 
>   http://article.gmane.org/gmane.mail.exim.announce/168

applied in my branch (updated to 4.86.2)

Thanks


-- 
Willy Sudiarto Raharjo

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <http://lists.slackbuilds.org/pipermail/slackbuilds-users/attachments/20160306/5b94eaec/attachment.asc>


More information about the SlackBuilds-users mailing list