--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-b317dd9220
2023-11-03 18:20:20.951386
--------------------------------------------------------------------------------

Name        : libspf2
Product     : Fedora 39
Version     : 1.2.11
Release     : 11.20210922git4915c308.fc39
URL         : https://www.libspf2.org/
Summary     : An implementation of the SPF specification
Description :
libspf2 is an implementation of the SPF (Sender Policy Framework)
specification as found at:
https://www.ietf.org/archive/id/draft-mengwong-spf-00.txt
SPF allows email systems to check SPF DNS records and make sure that
an email is authorized by the administrator of the domain name that
it is coming from. This prevents email forgery, commonly used by
spammers, scammers, and email viruses/worms.

A lot of effort has been put into making it secure by design, and a
great deal of effort has been put into the regression tests.

--------------------------------------------------------------------------------
Update Information:

Patch CVE-2023-42118, plus some other fixes.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct  3 2023 Bojan Smojver  - 1.2.11-11.20210922git4915c308
- Add fixes from pull request 47
* Mon Oct  2 2023 Bojan Smojver  - 1.2.11-10.20210922git4915c308
- CVE-2023-42118
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2241536 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2241536
  [ 2 ] Bug #2241537 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2241537
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-b317dd9220' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/login/

Fedora 39: libspf2 2023-b317dd9220

November 3, 2023
Patch CVE-2023-42118, plus some other fixes.

Summary

libspf2 is an implementation of the SPF (Sender Policy Framework)

specification as found at:

https://www.ietf.org/archive/id/draft-mengwong-spf-00.txt

SPF allows email systems to check SPF DNS records and make sure that

an email is authorized by the administrator of the domain name that

it is coming from. This prevents email forgery, commonly used by

spammers, scammers, and email viruses/worms.

A lot of effort has been put into making it secure by design, and a

great deal of effort has been put into the regression tests.

Update Information:

Patch CVE-2023-42118, plus some other fixes.

Change Log

* Tue Oct 3 2023 Bojan Smojver - 1.2.11-11.20210922git4915c308 - Add fixes from pull request 47 * Mon Oct 2 2023 Bojan Smojver - 1.2.11-10.20210922git4915c308 - CVE-2023-42118

References

[ 1 ] Bug #2241536 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241536 [ 2 ] Bug #2241537 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241537

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-b317dd9220' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html

Severity
Name : libspf2
Product : Fedora 39
Version : 1.2.11
Release : 11.20210922git4915c308.fc39
URL : https://www.libspf2.org/
Summary : An implementation of the SPF specification

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo