- Issued:
- 2009-12-02
- Updated:
- 2010-03-30
RHBA-2009:1627 - Bug Fix Advisory
Synopsis
exim bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated exim packages that resolve several issues are now available.
Description
Exim is a message transfer agent (MTA) developed at the University of
Cambridge for use on Unix systems connected to the Internet. It is freely
available under the terms of the GNU General Public Licence. In style it is
similar to Smail 3, but its facilities are more general. There is a great
deal of flexibility in the way mail can be routed, and there are extensive
facilities for checking incoming mail. Exim can be installed in place of
sendmail, although the configuration of exim is quite different to that of
sendmail.
These updated exim packages provide fixes for the following bugs:
- The exim init script would return with error code 0 regardless of if the
service had actually been started. An incorrect return code would be issued
concerning the exim init script because of an unimplemented feature of the
script. These bugs concerning the exim init script have been corrected by
modifying it to return a value of 2 on an unsupported command, a return of
1 when the $NETWORKING parameter is set to no, returning the correct status
error to the user and forcing the script to restart (using condrestart)
when the status is not equal to 0.
- The default configuration referred to an undefined domain list causing
errors when trying to relay email. The correct domain list of
relay_to_domains is now utilized.
- Exim listened on all interfaces by default, whereas Sendmail and Postfix
only listen on loopback by default. Administrators who would assume exim
had default settings configured the same as Sendmail and Postfix may have
introduced a security hole when installing exim. To correct this the code
segment local_interfaces = <; 127.0.0.1 ; ::1; has been added to the
default configuration; allowing Administrators to treat exim default
settings the same as Sendmail and Postfix.
- Exim used to attempt generation of the certificate on installation
instead of the first start, which could cause the installation to fail when
the certificate could not be generated. Certificate generation is now
undertaken upon the first start of exim after installation, allowing the
installation to succeed.
All users of exim are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 238026 - Wrong init script
- BZ - 248289 - exim.conf refers to an undefined domainlist
- BZ - 510203 - exim installation, error in %post, chown: cannot access `/etc/pki/tls/private/exim.pem'
- BZ - 513492 - Exim listens on all IP by default
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
x86_64 | |
exim-4.63-5.el5.x86_64.rpm | SHA-256: 1e85a6894415496e4cd364d97c41ec4d9f5b44c26c9420bb5eab676515ce1015 |
exim-mon-4.63-5.el5.x86_64.rpm | SHA-256: a4ef18d2b3358ba9dae0924515f117d0c557bf9ffb2a006e2c26a468b77135eb |
exim-sa-4.63-5.el5.x86_64.rpm | SHA-256: ca7e0d9fd05084131c4fcdf8c7cfbbdc500afa35c808f7dc007e8694a9168bf7 |
ia64 | |
exim-4.63-5.el5.ia64.rpm | SHA-256: a2ca04f802cdfe8f95503526fed7987f17e31e151f04cd54a16c24a53badb463 |
exim-mon-4.63-5.el5.ia64.rpm | SHA-256: 6c979d5b171f9181018a7edb8e0e3adc5e07ddabb1c6081faf31e91748c6641c |
exim-sa-4.63-5.el5.ia64.rpm | SHA-256: ac765f4e11ced1c99f6a042b580beaa92da5749933c7be2931ce6327a6042c20 |
i386 | |
exim-4.63-5.el5.i386.rpm | SHA-256: d71bc559cda7a3beb8b24c3a4c3934054d2cb51cb2c62f7ffda9f87001a1a4b3 |
exim-mon-4.63-5.el5.i386.rpm | SHA-256: 9f9dcb6559949b6260df6cbab1a34edfb5a9f5ed36c5e6468aa98c993d8ebc42 |
exim-sa-4.63-5.el5.i386.rpm | SHA-256: 5f12ac746955794f564ae5ddcc1f7a9cc4641572a35c50a0921bb45095818353 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
x86_64 | |
exim-4.63-5.el5.x86_64.rpm | SHA-256: 1e85a6894415496e4cd364d97c41ec4d9f5b44c26c9420bb5eab676515ce1015 |
exim-mon-4.63-5.el5.x86_64.rpm | SHA-256: a4ef18d2b3358ba9dae0924515f117d0c557bf9ffb2a006e2c26a468b77135eb |
exim-sa-4.63-5.el5.x86_64.rpm | SHA-256: ca7e0d9fd05084131c4fcdf8c7cfbbdc500afa35c808f7dc007e8694a9168bf7 |
i386 | |
exim-4.63-5.el5.i386.rpm | SHA-256: d71bc559cda7a3beb8b24c3a4c3934054d2cb51cb2c62f7ffda9f87001a1a4b3 |
exim-mon-4.63-5.el5.i386.rpm | SHA-256: 9f9dcb6559949b6260df6cbab1a34edfb5a9f5ed36c5e6468aa98c993d8ebc42 |
exim-sa-4.63-5.el5.i386.rpm | SHA-256: 5f12ac746955794f564ae5ddcc1f7a9cc4641572a35c50a0921bb45095818353 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
x86_64 | |
exim-4.63-5.el5.x86_64.rpm | SHA-256: 1e85a6894415496e4cd364d97c41ec4d9f5b44c26c9420bb5eab676515ce1015 |
exim-mon-4.63-5.el5.x86_64.rpm | SHA-256: a4ef18d2b3358ba9dae0924515f117d0c557bf9ffb2a006e2c26a468b77135eb |
exim-sa-4.63-5.el5.x86_64.rpm | SHA-256: ca7e0d9fd05084131c4fcdf8c7cfbbdc500afa35c808f7dc007e8694a9168bf7 |
i386 | |
exim-4.63-5.el5.i386.rpm | SHA-256: d71bc559cda7a3beb8b24c3a4c3934054d2cb51cb2c62f7ffda9f87001a1a4b3 |
exim-mon-4.63-5.el5.i386.rpm | SHA-256: 9f9dcb6559949b6260df6cbab1a34edfb5a9f5ed36c5e6468aa98c993d8ebc42 |
exim-sa-4.63-5.el5.i386.rpm | SHA-256: 5f12ac746955794f564ae5ddcc1f7a9cc4641572a35c50a0921bb45095818353 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
s390x | |
exim-4.63-5.el5.s390x.rpm | SHA-256: b2b8b6937df2b7de771af06903980abbf093f35095cf37d6eb4b1f0727f9dc71 |
exim-mon-4.63-5.el5.s390x.rpm | SHA-256: 1143c5a49bb5d33b1395f972c03793c0685da4636bd9e72bc169452fe481b615 |
exim-sa-4.63-5.el5.s390x.rpm | SHA-256: 9d81c5f40b1c7108972db7268f05fc511718bd9ff15fbcce202eebe7afe5d1f4 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
ppc | |
exim-4.63-5.el5.ppc.rpm | SHA-256: f5793d9fe35f0c9c8523b1bb03770d0a27001c965e13eb2428889fa5a41fe8ee |
exim-mon-4.63-5.el5.ppc.rpm | SHA-256: 80caec4500ff41fa3b4cd3ac107c0f38154bb37291d1167593abf554140af9a8 |
exim-sa-4.63-5.el5.ppc.rpm | SHA-256: 8cfe1d0bc993ed10d5d2c5441a9e7748857d4d8738e81cf4e64dab69c286e4b7 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
exim-4.63-5.el5.src.rpm | SHA-256: 0e6a439b1c3d2ba4a8f97e7d7b7ca3548552e675da5f7d61b129ece99dd86258 |
x86_64 | |
exim-4.63-5.el5.x86_64.rpm | SHA-256: 1e85a6894415496e4cd364d97c41ec4d9f5b44c26c9420bb5eab676515ce1015 |
exim-mon-4.63-5.el5.x86_64.rpm | SHA-256: a4ef18d2b3358ba9dae0924515f117d0c557bf9ffb2a006e2c26a468b77135eb |
exim-sa-4.63-5.el5.x86_64.rpm | SHA-256: ca7e0d9fd05084131c4fcdf8c7cfbbdc500afa35c808f7dc007e8694a9168bf7 |
i386 | |
exim-4.63-5.el5.i386.rpm | SHA-256: d71bc559cda7a3beb8b24c3a4c3934054d2cb51cb2c62f7ffda9f87001a1a4b3 |
exim-mon-4.63-5.el5.i386.rpm | SHA-256: 9f9dcb6559949b6260df6cbab1a34edfb5a9f5ed36c5e6468aa98c993d8ebc42 |
exim-sa-4.63-5.el5.i386.rpm | SHA-256: 5f12ac746955794f564ae5ddcc1f7a9cc4641572a35c50a0921bb45095818353 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.