[CLSA-2021:1640271821] Fix CVE(s): CVE-2020-28024, CVE-2020-28025, CVE-2020-28026, CVE-2020-28020, CVE-2020-28021, CVE-2020-28022, CVE-2020-28011, CVE-2020-28013, CVE-2020-28012, CVE-2020-28015, CVE-2020-28007, CVE-2020-28017, CVE-2021-27216, CVE-2020-28008, CVE-2020-28009, CVE-2020-28014
Type:
security
Severity:
moderate
Release date:
2021-12-23 15:03:41 UTC
Description:
* SECURITY UPDATE: Multiple security issues - debian/patches/CVE-2020-28007.patch - debian/patches/CVE-2020-28008.patch - debian/patches/CVE-2020-28009.patch - debian/patches/CVE-2020-28011.patch - debian/patches/CVE-2020-28012.patch - debian/patches/CVE-2020-28013.patch - debian/patches/CVE-2020-28014+CVE-2021-27216.patch - debian/patches/CVE-2020-28015+28021.patch - debian/patches/CVE-2020-28017.patch - debian/patches/CVE-2020-28020.patch - debian/patches/CVE-2020-28022.patch - debian/patches/CVE-2020-28024.patch - debian/patches/CVE-2020-28025.patch - debian/patches/CVE-2020-28026.patch: backport patches from upstream to correct issues. - CVE-2020-28007, CVE-2020-28008, CVE-2020-28009, CVE-2020-28011, CVE-2020-28012, CVE-2020-28013, CVE-2020-28014, CVE-2020-28015, CVE-2020-28017, CVE-2020-28020, CVE-2020-28021, CVE-2020-28022, CVE-2020-28024, CVE-2020-28025, CVE-2020-28026, CVE-2021-27216
Updated packages:
  • exim4_4.86.2-2ubuntu2.6+tuxcare.els1_all.deb
    sha:8d6ef61956d190b583fa19101bae9952aec1fb80
  • exim4-base_4.86.2-2ubuntu2.6+tuxcare.els1_amd64.deb
    sha:daa528b2fe0a4942bb5b400c58022a977bb98a5d
  • exim4-config_4.86.2-2ubuntu2.6+tuxcare.els1_all.deb
    sha:7aa4603b05de6ef8c9628628cd3d5f6d032af48d
  • exim4-daemon-heavy_4.86.2-2ubuntu2.6+tuxcare.els1_amd64.deb
    sha:df98dd9c0ed3f1f60522702c828b3dee1f40006b
  • exim4-daemon-light_4.86.2-2ubuntu2.6+tuxcare.els1_amd64.deb
    sha:e1d5a2f4fe45f35621fc64f186d727e9e6557883
  • exim4-dev_4.86.2-2ubuntu2.6+tuxcare.els1_amd64.deb
    sha:255eb10058274a0cb0ac8d4c9405330f15970e1c
  • eximon4_4.86.2-2ubuntu2.6+tuxcare.els1_amd64.deb
    sha:746b5de73d2522fe77a17a9e8b09b7bed00ece1a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.