exim4 is vulnerable to denial of service. The vulnerability exists in src/expand.c
due to use after free in Regex Handler which allows an attacker to crash the application via malicious input.
bugs.exim.org/show_bug.cgi?id=2915
git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
lists.fedoraproject.org/archives/list/[email protected]/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
lists.fedoraproject.org/archives/list/[email protected]/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
lists.fedoraproject.org/archives/list/[email protected]/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
security-tracker.debian.org/tracker/CVE-2022-3559
vuldb.com/?id.211073