Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4-base" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4-config" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4-daemon-heavy" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4-daemon-light" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "exim4-dev" }, { "binary_version": "4.82-3ubuntu2.2", "binary_name": "eximon4" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4-base" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4-config" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4-daemon-heavy" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4-daemon-light" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "exim4-dev" }, { "binary_version": "4.86.2-2ubuntu2.1", "binary_name": "eximon4" } ] }