Hacker News
Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
kro
|next
[-]
https://lists.debian.org/debian-security-announce/2026/msg00...
avian
|root
|parent
|next
[-]
I saw that announcement yesterday, went through the list of fixed issues and decided to wait with the upgrade since none of them were relevant for me.
If I haven't just seen this on the second page of HN I would have probably deferred this upgrade for a few more days.
fweimer
|root
|parent
|previous
[-]
exim4 (4.98.2-1+deb13u2) trixie-security; urgency=high
* Backport fix for Use-After-Free in GnuTLS BDAT/CHUNKING code path.
This is Exim-Security-2026-05-01.1, fixed upstream in 4.99.3.
-- Andreas Metzler <ametzler@debian.org> Mon, 11 May 2026 19:14:46 +0200
The ID is now in the CVE database, but it was missing from the upstream advisory, too: https://exim.org/static/doc/security/EXIM-Security-2026-05-0...Not ideal, but at least we got the fix.
ofjcihen
|next
|previous
[-]
Gag.
gwern
|root
|parent
|next
[-]
AntiUSAbah
|root
|parent
|previous
[-]
somat
|root
|parent
|next
[-]
I too suffer from lack of interest in machine written posts. but the real sociological problem is because it is hard to tell the difference, disinterest turns into paranoia. And this hurts everyone.
However in this case, the article in question does not read like machine written, so perhaps the revulsion was just over the hyperbolic tone.
ofjcihen
|root
|parent
|previous
[-]
These people write like they picture themselves as sages describing the end times to scared children.
plorg
|root
|parent
|next
[-]
AntiUSAbah
|root
|parent
|previous
[-]
You complain about their writing style, no one forced you to read, which you could summarize with an AI if you even cared for the conent but no.
And i read A LOT and i do not come across this writing style at all.
linkregister
|root
|parent
|next
[-]
Twirrim
|root
|parent
|next
|previous
[-]
On a site dedicated to commenting on articles? I think you have a misunderstanding of how HN works. People (hopefully) read the article and share uninformed^H informed opinions on the article.
That has always included critique of the way that the content is written.
In this case, very valid critique. I'm astounded you're somehow managing to read "A LOT" and not run into it regularly. At least we seem to be moving away from the absolutely awful "I'm a crazy frat bro" style of writing where it feels like half the action sentences should be appended with "because I'm crazy!" that was spreading far too far and wide (hopefully because it's hard to coax AI into that style.)
tardedmeme
|next
|previous
[-]
eqvinox
|next
|previous
[-]
2025-05-01 - Vulnerability submitted to security@exim.org
2026-05-08 - Exim maintainers notified the Distros
2026-05-10 - Restricted Access is provided for Distros
2026-05-12 - Public release and Coordinated distro Release
4 (2 really) days for distros, and then nothing, zero, zilch, nada between "Coordinated distro Release" and "Public release"?"I should retrain. Something with wood." is the appropriate German idiom for this, I guess.
fulafel
|next
|previous
[-]
Previously (2020): https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE...
Previously (2019): https://www.cvedetails.com/vulnerability-list/vendor_id-1091...
eqvinox
|root
|parent
[-]
stackghost
|next
|previous
[-]
Color me surprised. The GNU ecosystem has had more than its fair share of CVEs over the years to the point that it's now a common trope:
https://soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-crypt...
yrro
|root
|parent
|next
[-]
Since OpenSSL 3 is now available under a GPL-compatible license, I think it's long past time to switch. But judging by the sorry state of https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446036 I don't think it's going to happen any time soon.
aftbit
|next
|previous
[-]
sys42590
|root
|parent
|next
[-]
tptacek
|root
|parent
[-]
j16sdiz
|root
|parent
|next
[-]
The official release is not standard compliance. It does not support anything modern spam filter need. It don't get new updates or features. It have funny license.
You can use a fork... but I need to ask: which fork?
aftbit
|root
|parent
|next
|previous
[-]
loloquwowndueo
|root
|parent
|next
|previous
[-]
I’ve been looking at Stalwart to replace my old exim setup, wondering if it’s a reasonable choice.
comex
|root
|parent
|next
[-]
kees99
|root
|parent
|previous
[-]
rs_rs_rs_rs_rs
|root
|parent
[-]
tptacek
|root
|parent
[-]
rs_rs_rs_rs_rs
|root
|parent
[-]
tptacek
|root
|parent
[-]
(I don't think anyone should run qmail.)
nhattruongadm
|next
|previous
[-]
There's a pattern here worth noting: the riskiest attack surfaces in complex C software often aren't in the core logic but at integration boundaries — where one component (Exim) makes assumptions about object lifecycles managed by another (GnuTLS). Those boundaries require simultaneous deep familiarity with both codebases, which is cognitively expensive for humans but maps well to automated analysis.
This is also why "use a well-audited TLS library" doesn't fully transfer safety — you inherit the library's correctness guarantees only for the paths the library authors tested, not for how you call it under load or error conditions.
alpb
|previous
[-]
> Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email.
what's the significance of this? do people use this in production systems?