-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.1520.2
                     USN-4934-1: Exim vulnerabilities
                                7 May 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Exim
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Modify Arbitrary Files          -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-27216 CVE-2020-28026 CVE-2020-28025
                   CVE-2020-28024 CVE-2020-28023 CVE-2020-28022
                   CVE-2020-28021 CVE-2020-28020 CVE-2020-28019
                   CVE-2020-28018 CVE-2020-28017 CVE-2020-28016
                   CVE-2020-28015 CVE-2020-28014 CVE-2020-28013
                   CVE-2020-28012 CVE-2020-28011 CVE-2020-28010
                   CVE-2020-28009 CVE-2020-28008 CVE-2020-28007

Reference:         ESB-2021.1512

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-4934-1
   https://ubuntu.com/security/notices/USN-4934-2

Comment: This bulletin contains two (2) Ubuntu security advisories.

Revision History:  May 7 2021: Added advisory for Ubuntu 16.04 ESM and 14.04 ESM
                   May 5 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4934-1: Exim vulnerabilities
04 May 2021

Several security issues were fixed in Exim.
Releases

  o Ubuntu 21.04
  o Ubuntu 20.10
  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 LTS

Packages

  o exim4 - Exim is a mail transport agent

Details

It was discovered that Exim contained multiple security issues. An attacker
could use these issues to cause a denial of service, execute arbitrary
code remotely, obtain sensitive information, or escalate local privileges.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.04

  o exim4-daemon-heavy - 4.94-15ubuntu1.2
  o exim4-base - 4.94-15ubuntu1.2
  o exim4-daemon-light - 4.94-15ubuntu1.2

Ubuntu 20.10

  o exim4-daemon-heavy - 4.94-7ubuntu1.2
  o exim4-base - 4.94-7ubuntu1.2
  o exim4-daemon-light - 4.94-7ubuntu1.2

Ubuntu 20.04

  o exim4-daemon-heavy - 4.93-13ubuntu1.5
  o exim4-base - 4.93-13ubuntu1.5
  o exim4-daemon-light - 4.93-13ubuntu1.5

Ubuntu 18.04

  o exim4-daemon-heavy - 4.90.1-1ubuntu1.8
  o exim4-base - 4.90.1-1ubuntu1.8
  o exim4-daemon-light - 4.90.1-1ubuntu1.8

In general, a standard system update will make all the necessary changes.

References

  o CVE-2020-28022
  o CVE-2020-28026
  o CVE-2020-28009
  o CVE-2020-28012
  o CVE-2020-28018
  o CVE-2020-28014
  o CVE-2020-28015
  o CVE-2020-28024
  o CVE-2020-28017
  o CVE-2020-28025
  o CVE-2020-28011
  o CVE-2020-28008
  o CVE-2020-28013
  o CVE-2020-28007
  o CVE-2020-28010
  o CVE-2020-28019
  o CVE-2020-28016
  o CVE-2020-28023
  o CVE-2020-28020
  o CVE-2020-28021
  o CVE-2021-27216


- --------------------------------------------------------------------------------


USN-4934-2: Exim vulnerabilities
06 May 2021

Several security issues were fixed in Exim.
Releases

  o Ubuntu 16.04 ESM
  o Ubuntu 14.04 ESM

Packages

  o exim4 - Exim is a mail transport agent

Details

USN-4934-1 fixed several vulnerabilities in Exim. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
CVE-2020-28026 only affected Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Exim contained multiple security issues. An attacker
could use these issues to cause a denial of service, execute arbitrary
code remotely, obtain sensitive information, or escalate local privileges.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 16.04

  o exim4-daemon-heavy - 4.86.2-2ubuntu2.6+esm1
    Available with UA Infra or UA Desktop
  o exim4-base - 4.86.2-2ubuntu2.6+esm1
    Available with UA Infra or UA Desktop
  o exim4-daemon-light - 4.86.2-2ubuntu2.6+esm1
    Available with UA Infra or UA Desktop

Ubuntu 14.04

  o exim4-daemon-heavy - 4.82-3ubuntu2.4+esm3
    Available with UA Infra or UA Desktop
  o exim4-base - 4.82-3ubuntu2.4+esm3
    Available with UA Infra or UA Desktop
  o exim4-daemon-light - 4.82-3ubuntu2.4+esm3
    Available with UA Infra or UA Desktop

In general, a standard system update will make all the necessary changes.

References

  o CVE-2020-28011
  o CVE-2020-28009
  o CVE-2021-27216
  o CVE-2020-28022
  o CVE-2020-28025
  o CVE-2020-28026
  o CVE-2020-28024
  o CVE-2020-28014
  o CVE-2020-28007
  o CVE-2020-28016
  o CVE-2020-28020
  o CVE-2020-28013
  o CVE-2020-28008
  o CVE-2020-28015
  o CVE-2020-28017
  o CVE-2020-28012

Related notices

  o USN-4934-1 : exim4, exim4-base, exim4-daemon-light, exim4-daemon-heavy

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YG7P
-----END PGP SIGNATURE-----