{"schema_version":"1.7.2","id":"OESA-2024-2307","modified":"2024-11-01T11:09:28Z","published":"2024-11-01T11:09:28Z","upstream":["CVE-2024-25768"],"summary":"opendmarc security update","details":"OpenDMARC (Domain-based Message Authentication, Reporting \u0026amp; Conformance) provides an open source library that implements the DMARC verification service plus a milter-based filter application that can plug in to any milter-aware MTA, including sendmail, Postfix, or any other MTA that supports the milter protocol.\r\n\r\nSecurity Fix(es):\r\n\r\nOpenDMARC 1.4.2 contains a null pointer dereference vulnerability in /OpenDMARC/libopendmarc/opendmarc_policy.c.(CVE-2024-25768)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"opendmarc","purl":"pkg:rpm/openEuler/opendmarc\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.2-3.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["libopendmarc-1.4.2-3.oe2203sp3.aarch64.rpm","libopendmarc-devel-1.4.2-3.oe2203sp3.aarch64.rpm","opendmarc-1.4.2-3.oe2203sp3.aarch64.rpm","opendmarc-debuginfo-1.4.2-3.oe2203sp3.aarch64.rpm","opendmarc-debugsource-1.4.2-3.oe2203sp3.aarch64.rpm"],"src":["opendmarc-1.4.2-3.oe2203sp3.src.rpm"],"x86_64":["libopendmarc-1.4.2-3.oe2203sp3.x86_64.rpm","libopendmarc-devel-1.4.2-3.oe2203sp3.x86_64.rpm","opendmarc-1.4.2-3.oe2203sp3.x86_64.rpm","opendmarc-debuginfo-1.4.2-3.oe2203sp3.x86_64.rpm","opendmarc-debugsource-1.4.2-3.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25768"}],"database_specific":{"severity":"Low"}}