Arch Linux 840 Published by

Updated Exim packages are available for ArchLinux to address a use-after-free issue that can lead to potential privilege escalation:

[ASA-202503-1] exim: privilege escalation




[ASA-202503-1] exim: privilege escalation


Arch Linux Security Advisory ASA-202503-1
=========================================

Severity: High
Date : 2025-03-26
CVE-ID : CVE-2025-30232
Package : exim
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-2859

Summary
=======

The package exim before version 4.98.2-1 is vulnerable to privilege
escalation.

Resolution
==========

Upgrade to 4.98.2-1.

# pacman -Syu "exim&rt;=4.98.2-1"

The problem has been fixed upstream in version 4.98.2.

Workaround
==========

None.

Description
===========

A use-after-free has been discovered in exim that can lead to potential
privilege escalation due to the lack of nulling out the
debug_pretrigger_buf pointer before freeing the buffer by the storage
management.

Impact
======

A local unprivileged attacker is able to escalate privileges on the
affected host.

References
==========

https://exim.org/static/doc/security/CVE-2025-30232.txt
https://lists.exim.org/lurker/message/20250326.140105.6b97555b.en.html
https://code.exim.org/exim/exim/commit/be040d7df68a8cbb244aaabc37832984dafcbf55
https://security.archlinux.org/CVE-2025-30232