/srv/irclogs.ubuntu.com/2022/06/15/#ubuntu-security.txt

ItzSwirlzsarnold: facts00:36
=== amurray_ is now known as amurray
=== blahdeblah_ is now known as blahdeblah
rbasakmdeslaur: I understand openssl Bionic SRUs are backed up. You might find https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1978093 useful though.11:59
ubottuLaunchpad bug 1978093 in openssl (Ubuntu Bionic) "openssl: FTBFS due to expired certificates" [Undecided, New]11:59
mdeslaurrbasak: ah, thanks, I'll include those in the security update12:00
hankre: CVE-2021-33912: the broken date is still in the OVAL feeds: `curl -sSLf 'https://security-metadata.canonical.com/oval/com.ubuntu.focal.cve.oval.xml.bz2' | bzgrep '>unknown<'`18:38
ubottulibspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infra... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33912>18:38
hankditto the other libspf2 advisory18:50
sarnoldargh. :( thanks hank19:37
=== jchittum_ is now known as jchittum

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!