Name | CVE-2025-30232 |
Description | A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5887-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
exim4 (PTS) | bullseye | 4.94.2-7+deb11u3 | fixed |
| bullseye (security) | 4.94.2-7+deb11u4 | fixed |
| bookworm | 4.96-15+deb12u6 | vulnerable |
| bookworm (security) | 4.96-15+deb12u7 | fixed |
| trixie | 4.98.1-2 | fixed |
| sid | 4.98.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
exim4 | source | bullseye | (not affected) | | | |
exim4 | source | bookworm | 4.96-15+deb12u7 | | DSA-5887-1 | |
exim4 | source | (unstable) | 4.98.1-2 | | | |
Notes
[bullseye] - exim4 <not-affected> (Vulnerable code not present)
https://exim.org/static/doc/security/CVE-2025-30232.txt
https://lists.exim.org/lurker/message/20250326.140105.6b97555b.en.html
Introduced after: https://code.exim.org/exim/exim/commit/19fdbfb4a2b6ca4a6a96ef52be848f0a23e2414f (exim-4.96-RC0)
Fixed by: https://code.exim.org/exim/exim/commit/be040d7df68a8cbb244aaabc37832984dafcbf55