Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 27 Aug 2011 20:07:10 +0200
From:      "Uffe R. B. Andersen" <urb@twe.net>
To:        freebsd-ports@freebsd.org
Subject:   Re: mail/postfix-policyd-spf relies on vulnerable mail/libspf2-10
Message-ID:  <4E59324E.5070602@twe.net>
In-Reply-To: <4E580082.1030202@FreeBSD.org>
References:  <4E57FBC1.1020009@FreeBSD.org> <4E580082.1030202@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Den 26-08-2011 22:22, Doug Barton skrev:
> Howdy,
> 
> Doing some port updates and noticed that mail/postfix-policyd-spf
> relies on mail/libspf2-10, which according to 
> http://portaudit.FreeBSD.org/2ddbfd29-a455-11dd-a55e-00163e000016.html
>
> 
is vulnerable. There is a port of mail/libspf2 which is not vulnerable,
> is it possible to update mail/postfix-policyd-spf to rely on it
> instead?

libspf2 port is currently libspf2-1.2.9_1 and according to the page
you refer to, the vulnerability affects libspf2 <1.2.8.

- -- 
Med venlig hilsen - Sincerely
Uffe R. B. Andersen - mailto:urb@twe.net
http://blog.andersen.nu/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (MingW32)

iEYEARECAAYFAk5ZMk4ACgkQxC95nUQcrphdDACgylOM4Jw4D+JHh4aHbI1e6Lgy
XgoAoMk09edbD58jkuD4Noar+boPiSmI
=TRMu
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E59324E.5070602>