-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-ae340c92ea 2023-10-09 01:26:34.405082 -------------------------------------------------------------------------------- Name : libspf2 Product : Fedora 37 Version : 1.2.11 Release : 11.20210922git4915c308.fc37 URL : https://www.libspf2.org/ Summary : An implementation of the SPF specification Description : libspf2 is an implementation of the SPF (Sender Policy Framework) specification as found at: https://www.ietf.org/internet-drafts/draft-mengwong-spf-00.txt SPF allows email systems to check SPF DNS records and make sure that an email is authorized by the administrator of the domain name that it is coming from. This prevents email forgery, commonly used by spammers, scammers, and email viruses/worms. A lot of effort has been put into making it secure by design, and a great deal of effort has been put into the regression tests. -------------------------------------------------------------------------------- Update Information: Patch CVE-2023-42118, plus some other fixes. -------------------------------------------------------------------------------- ChangeLog: * Tue Oct 3 2023 Bojan Smojver- 1.2.11-11.20210922git4915c308 - Add fixes from pull request 47 * Mon Oct 2 2023 Bojan Smojver - 1.2.11-10.20210922git4915c308 - CVE-2023-42118 * Thu Jul 20 2023 Fedora Release Engineering - 1.2.11-8.20210922git4915c308 - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild * Tue Jul 11 2023 Jitka Plesnikova - 1.2.11-7.20210922git4915c308 - Perl 5.38 rebuild * Thu Jan 19 2023 Fedora Release Engineering - 1.2.11-6.20210922git4915c308 - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild * Fri Jan 6 2023 Peter Fordham - 1.2.11-5.20210922git4915c308 - Add missing include of string.h for memset in spf_utils.c https://github.com/shevek/libspf2/issues/41 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2241536 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241536 [ 2 ] Bug #2241537 - CVE-2023-42118 libspf2: Integer Underflow Remote Code Execution Vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241537 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-ae340c92ea' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue