Hi,

On Fri, Oct 13, 2023 at 12:05:19PM +0200, Bert Van de Poel wrote:
> Package: libspf2-2
> Version: 1.2.10-7.1~deb11u1
> Severity: critical
> Tags: security patch
> Justification: root security hole
> X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
> 
> 
> As already outlined on
> https://security-tracker.debian.org/tracker/CVE-2023-42118 there's a
> known security issue in libspf2 found through a security review of
> Exim by the Zero Day Initiative. An integer underflow in libspf2 was
> found which can be used to perform RCEs. A patch on
> https://github.com/shevek/libspf2/pull/44 is available and has been
> merged into the main repository. All relevant links are already
> available on the Debian Security Tracker.

Please note that as already outlined in the security-tracker and on
the upstream issue there is still no confirmation from ZDI that the
two issues are the same. So no, we cannot consider the pull/44 from
upstream the fix for CVE-2023-42118.

Better communication on that matter from the anonymous reporter would
be very helpfull to clarify the libspf2 status.

Regards,
Salvatore

Reply via email to