[CLSA-2026:1778174719] Fix CVE(s): CVE-2026-40684
Type:
security
Severity:
Critical
Release date:
2026-05-08 07:11:17 UTC
Description:
* SECURITY UPDATE: Crash via malformed DNS response on musl libc systems - debian/patches/CVE-2026-40684.patch: handle musl libc dn_expand backslash-decimal escape oddity in string_copy_dnsdomain - CVE-2026-40684
Updated packages:
  • exim4_4.86.2-2ubuntu2.6+tuxcare.els8_all.deb
    sha:ba8c9eddeff8366b4c16186a60dec5a4a8403594
  • exim4-base_4.86.2-2ubuntu2.6+tuxcare.els8_amd64.deb
    sha:e1514d386d99069b5edfc22d1704ad1ce18aa9c8
  • exim4-config_4.86.2-2ubuntu2.6+tuxcare.els8_all.deb
    sha:a434ed6a1daa1926ec64457f03704525fc8d7127
  • exim4-daemon-heavy_4.86.2-2ubuntu2.6+tuxcare.els8_amd64.deb
    sha:c485d3155b10b2f303bcd7e6e44dc9c7926af202
  • exim4-daemon-light_4.86.2-2ubuntu2.6+tuxcare.els8_amd64.deb
    sha:b53fd31170c8df303c85bcdf9e1a76c5a94d6680
  • exim4-dev_4.86.2-2ubuntu2.6+tuxcare.els8_amd64.deb
    sha:ba995f4269d6623af53247a05f13ccc256d888a4
  • eximon4_4.86.2-2ubuntu2.6+tuxcare.els8_amd64.deb
    sha:8c176619e888de76ba7af865659d5a4b3d26e6de
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.