NIXPKGS-2026-1354
GitHub issue
published on
Permalink
CVE-2026-40684
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
maintainer.ignore
4 maintainers
- @4z3
- @dasJ
- @Conni2461
- @helsinki-Jo
- @LeSuisse accepted
- @LeSuisse published on GitHub
In Exim before 4.99.2, on systems using musl libc (not …
In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.
References
Affected products
Exim
- <4.99.2
Package maintainers
Ignored maintainers (4)
-
@4z3 Tomislav Viljetić <tv@krebsco.de>
-
@dasJ Janne Heß <janne@hess.ooo>
-
@Conni2461 Simon Hauser <simon-hauser@outlook.com>
-
@helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de>