Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#79978 - [libspf2] please include patch for CVE-2023-42118
Attached to Project:
Arch Linux
Opened by Geert Hendrickx (ghen) - Sunday, 15 October 2023, 20:43 GMT
Last edited by George Rawlinson (rawlinsong) - Thursday, 19 October 2023, 07:50 GMT
Opened by Geert Hendrickx (ghen) - Sunday, 15 October 2023, 20:43 GMT
Last edited by George Rawlinson (rawlinsong) - Thursday, 19 October 2023, 07:50 GMT
|
DetailsCan you please include the following patch for CVE-2023-42118 in libspf2: https://github.com/shevek/libspf2/pull/44
There was some recent fuzz around zero day vulnerabilities in Exim, but at least one looks like it is actually an libspf2 issue: https://thehackernews.com/2023/09/new-critical-security-flaws-expose-exim.html https://www.zerodayinitiative.com/advisories/ZDI-23-1472/ |
This task depends upon
Closed by George Rawlinson (rawlinsong)
Thursday, 19 October 2023, 07:50 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed in 1.2.11-2
Thursday, 19 October 2023, 07:50 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed in 1.2.11-2
And to fix a build issue with current gcc: https://github.com/shevek/libspf2/issues/41