Rendered at 05:18:43 GMT+0000 (Coordinated Universal Time) with Cloudflare Workers.
tardedmeme 45 minutes ago [-]
I've vouched no less than four reasonable comments under this post. Was there a mass flagging campaign?
kro 11 hours ago [-]
It says coordinated distro release today, and I've received a notice earlier today but that does not include the CVE number. That's confusing / does not seem very coordinated to release 2 separate security update notices in a day.
That mentions 4.98.2-1+deb13u2, and its changelog has:
exim4 (4.98.2-1+deb13u2) trixie-security; urgency=high
* Backport fix for Use-After-Free in GnuTLS BDAT/CHUNKING code path.
This is Exim-Security-2026-05-01.1, fixed upstream in 4.99.3.
-- Andreas Metzler <ametzler@debian.org> Mon, 11 May 2026 19:14:46 +0200
>What follows is, before anything else, a story. One of those old, well-worn ones.
Gag.
gwern 2 hours ago [-]
> also it is, more quietly, the account of how I tried to make peace with the new shape of the world we are now living in.
AntiUSAbah 8 hours ago [-]
No reason to be a dick.
He writes a full blog post, takes time and effort to do so, and you quit it with 'Gag'.
Get a grip
somat 8 hours ago [-]
I suspect the revulsion is that he did not write a full blog post, the time and effort was not consumed, instead there was an engine that did it for him. At which point interest drops significantly.
I too suffer from lack of interest in machine written posts. but the real sociological problem is because it is hard to tell the difference, disinterest turns into paranoia. And this hurts everyone.
However in this case, the article in question does not read like machine written, so perhaps the revulsion was just over the hyperbolic tone.
ofjcihen 8 hours ago [-]
Nah I’m just sick of the melodramatic style of writing that seems to pervade all of the major tech blogs and companies now.
These people write like they picture themselves as sages describing the end times to scared children.
plorg 8 hours ago [-]
Yeah, that extremely purple paragraph about how the blog was documenting that liminal period where humans worked together with AI as partners was embarrassing.
AntiUSAbah 8 hours ago [-]
And? then keep it for yourself. Why do i have to read your ignorant comment?
You complain about their writing style, no one forced you to read, which you could summarize with an AI if you even cared for the conent but no.
And i read A LOT and i do not come across this writing style at all.
linkregister 4 hours ago [-]
Complaining about someone's comment is inconsistent with your world view, if complaining about a blogger's writing style is verboten.
Twirrim 6 hours ago [-]
>And? then keep it for yourself. Why do i have to read your ignorant comment?
On a site dedicated to commenting on articles? I think you have a misunderstanding of how HN works. People (hopefully) read the article and share uninformed^H informed opinions on the article.
That has always included critique of the way that the content is written.
In this case, very valid critique. I'm astounded you're somehow managing to read "A LOT" and not run into it regularly. At least we seem to be moving away from the absolutely awful "I'm a crazy frat bro" style of writing where it feels like half the action sentences should be appended with "because I'm crazy!" that was spreading far too far and wide (hopefully because it's hard to coax AI into that style.)
otterley 7 hours ago [-]
Hey, knock it off. If you disagree with someone, be polite.
ofjcihen 8 hours ago [-]
> then keep it for yourself.
Nah.
eqvinox 6 hours ago [-]
I'm sorry but what the f is that timeline? (Condensed to relevant notifications:)
2025-05-01 - Vulnerability submitted to security@exim.org
2026-05-08 - Exim maintainers notified the Distros
2026-05-10 - Restricted Access is provided for Distros
2026-05-12 - Public release and Coordinated distro Release
4 (2 really) days for distros, and then nothing, zero, zilch, nada between "Coordinated distro Release" and "Public release"?
"I should retrain. Something with wood." is the appropriate German idiom for this, I guess.
What are you actually trying to say with these links?
fulafel 1 hours ago [-]
That Exim seems to have a relatiely high density of RCE vulnerabilities that are being made public at a fairly regular rate.
The track record is considerably worse than other widely used Unix MTAs, roughly on par with MS Exchange.
chadgpt1 3 hours ago [-]
"No way to prevent this!" say users of only language where this regularly happens.
aftbit 11 hours ago [-]
Ok now do postfix
sys42590 10 hours ago [-]
Many years ago I used Exim because it was default for my distro of choice back then. But after a few emergency patchings caused by yet another RCE in Exim I learned that switching to Postfix massively improved my sleep quality.
tptacek 10 hours ago [-]
There's a weird folk belief that Exim is a secure 2nd-generation MTA, but it's not; it's a 1st generation MTA, like Sendmail and Smail. The two "secure" 2nd generation MTAs are Postfix and qmail. You shouldn't use those either, really; there is no reason to run a memory-unsafe MTA, or, for that matter, an MTA that isn't backed by a real database.
j16sdiz 3 hours ago [-]
The problem with qmail is, everybody use a fork. No body use the real thing.
The official release is not standard compliance. It does not support anything modern spam filter need. It don't get new updates or features. It have funny license.
You can use a fork... but I need to ask: which fork?
aftbit 7 hours ago [-]
I run postfix in a receive-only mode to power inbound email processing. I'm very very glad there's no database requirement. It just passes the processing of inbound emails to a filter over stdin, which can do whatever it wants with databases or whatever it needs.
loloquwowndueo 10 hours ago [-]
Which one would you suggest using?
I’ve been looking at Stalwart to replace my old exim setup, wondering if it’s a reasonable choice.
tptacek 10 hours ago [-]
If security is your concern, Stalwart seems like a fine option, almost certainly better than Postfix.
10 hours ago [-]
kees99 11 hours ago [-]
Nah, go straight for qmail. Give it your best try.
rs_rs_rs_rs_rs 11 hours ago [-]
The usable qmail got owned by AI already, the unusable one not yet!
tptacek 10 hours ago [-]
Not by AI, but by humans awhile ago. I think Qualys weaponized a wontfix LP64 integer overflow in it just a couple years ago?
rs_rs_rs_rs_rs 10 hours ago [-]
The Calif people found a nice bug in a qmail fork(what I consider usable qmail) some weeks ago.
tptacek 10 hours ago [-]
Right, and that fork is the only version of qmail people still run, and the bug they found was extremely funny given Bernstein's original qmail design (it was, if I remember right, a popen(3) vulnerability --- something that never would have showed up in Bernstein's code, but that's what happens when code gets abandoned, it gets picked up by people who don't really understand it). But it's hard to charge that vulnerability against the original qmail design.
(I don't think anyone should run qmail.)
adrian_b 7 hours ago [-]
Actually the original qmail still works fine.
However it has some compatibility problems with modern practices, the most significant being that it does not know TLS.
Having to use TLS is the main reason for running a qmail fork instead of the original.
eqvinox 6 hours ago [-]
"works fine" and "has some compatibility problems" is a little bit of an oxymoron... I understand what you're trying to say, but that does mean it's essentially unusable, despite "working fine".
stackghost 11 hours ago [-]
>The bug is a use-after-free triggered when a TLS connection is handled by GnuTLS
Color me surprised. The GNU ecosystem has had more than its fair share of CVEs over the years to the point that it's now a common trope:
If you read the rest of the post, gnutls wasn't the cause.
nhattruongadm 10 hours ago [-]
The finding method is almost as interesting as the bug itself. XBOW is an AI-based offensive security tool, and UAF bugs at library integration points are exactly the kind of thing that slips past human code review — reviewers focus on protocol logic, not on what happens to object lifetimes when a TLS session tears down mid-flight in an error path.
There's a pattern here worth noting: the riskiest attack surfaces in complex C software often aren't in the core logic but at integration boundaries — where one component (Exim) makes assumptions about object lifecycles managed by another (GnuTLS). Those boundaries require simultaneous deep familiarity with both codebases, which is cognitively expensive for humans but maps well to automated analysis.
This is also why "use a well-audited TLS library" doesn't fully transfer safety — you inherit the library's correctness guarantees only for the paths the library authors tested, not for how you call it under load or error conditions.
alpb 5 hours ago [-]
Never heard of Exim, I'm just realizing what it is:
> Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email.
what's the significance of this? do people use this in production systems?
nubinetwork 5 hours ago [-]
Exim is apparently the largest email server these days... it used to be postfix, but with most people using Gmail or 365, running your own email seems to be an afterthought. /shrug
hjilk 5 hours ago [-]
I had the exact same reaction - never heard of this.
https://lists.debian.org/debian-security-announce/2026/msg00...
Not ideal, but at least we got the fix.
Gag.
He writes a full blog post, takes time and effort to do so, and you quit it with 'Gag'.
Get a grip
I too suffer from lack of interest in machine written posts. but the real sociological problem is because it is hard to tell the difference, disinterest turns into paranoia. And this hurts everyone.
However in this case, the article in question does not read like machine written, so perhaps the revulsion was just over the hyperbolic tone.
These people write like they picture themselves as sages describing the end times to scared children.
You complain about their writing style, no one forced you to read, which you could summarize with an AI if you even cared for the conent but no.
And i read A LOT and i do not come across this writing style at all.
On a site dedicated to commenting on articles? I think you have a misunderstanding of how HN works. People (hopefully) read the article and share uninformed^H informed opinions on the article.
That has always included critique of the way that the content is written.
In this case, very valid critique. I'm astounded you're somehow managing to read "A LOT" and not run into it regularly. At least we seem to be moving away from the absolutely awful "I'm a crazy frat bro" style of writing where it feels like half the action sentences should be appended with "because I'm crazy!" that was spreading far too far and wide (hopefully because it's hard to coax AI into that style.)
Nah.
"I should retrain. Something with wood." is the appropriate German idiom for this, I guess.
Previously (2020): https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE...
Previously (2019): https://www.cvedetails.com/vulnerability-list/vendor_id-1091...
The track record is considerably worse than other widely used Unix MTAs, roughly on par with MS Exchange.
The official release is not standard compliance. It does not support anything modern spam filter need. It don't get new updates or features. It have funny license.
You can use a fork... but I need to ask: which fork?
I’ve been looking at Stalwart to replace my old exim setup, wondering if it’s a reasonable choice.
(I don't think anyone should run qmail.)
However it has some compatibility problems with modern practices, the most significant being that it does not know TLS.
Having to use TLS is the main reason for running a qmail fork instead of the original.
Color me surprised. The GNU ecosystem has had more than its fair share of CVEs over the years to the point that it's now a common trope:
https://soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-crypt...
There's a pattern here worth noting: the riskiest attack surfaces in complex C software often aren't in the core logic but at integration boundaries — where one component (Exim) makes assumptions about object lifecycles managed by another (GnuTLS). Those boundaries require simultaneous deep familiarity with both codebases, which is cognitively expensive for humans but maps well to automated analysis.
This is also why "use a well-audited TLS library" doesn't fully transfer safety — you inherit the library's correctness guarantees only for the paths the library authors tested, not for how you call it under load or error conditions.
> Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email.
what's the significance of this? do people use this in production systems?