Package: libspf2-2
Version: 1.2.10-7.1~deb11u1
Severity: critical
Tags: security patch
Justification: root security hole
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>


As already outlined on 
https://security-tracker.debian.org/tracker/CVE-2023-42118 there's a known 
security issue in libspf2 found through a security review of Exim by the Zero 
Day Initiative. An integer underflow in libspf2 was found which can be used to 
perform RCEs. A patch on https://github.com/shevek/libspf2/pull/44 is available 
and has been merged into the main repository. All relevant links are already 
available on the Debian Security Tracker.

-- System Information:
Debian Release: 11.8
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-25-amd64 (SMP w/16 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=locale: Cannot set 
LC_ALL to default locale: No such file or directory
UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libspf2-2 depends on:
ii  libc6  2.31-13+deb11u7

libspf2-2 recommends no packages.

libspf2-2 suggests no packages.

-- debconf information excluded

Reply via email to