Unspecified buffer overflow
Bug #287534 reported by
Scott Kitterman
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libspf2 (Ubuntu) |
Fix Released
|
High
|
Scott Kitterman | ||
Dapper |
Fix Released
|
High
|
Scott Kitterman | ||
Gutsy |
Fix Released
|
High
|
Scott Kitterman | ||
Hardy |
Fix Released
|
High
|
Scott Kitterman | ||
Intrepid |
Fix Released
|
Undecided
|
Scott Kitterman |
Bug Description
Upstream just found another exploit in libspf2 and has a working model. I don't have details, but expect a 1.2.9 security release before the weekend. It affects both 1.2.5 and 1.2.8.
Changed in libspf2: | |
status: | New → Confirmed |
status: | New → Confirmed |
status: | New → Confirmed |
status: | New → Confirmed |
Changed in libspf2: | |
status: | Fix Committed → Fix Released |
status: | Fix Committed → Fix Released |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
1.2.9 is released and contains both a fix and a working local exploit for testing. The fix is very intrusive. Am working with upstream and Debian for a simpler patch for the deployed releases.