SECURITY: Fedora 33 Update: libspf2-1.2.11-1.20210922git4915c308.fc33
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-044be3d54e
2021-09-30 01:05:07.096393
--------------------------------------------------------------------------------
Name : libspf2
Product : Fedora 33
Version : 1.2.11
Release : 1.20210922git4915c308.fc33
URL : http://www.libspf2.org/
Summary : An implementation of the SPF specification
Description :
libspf2 is an implementation of the SPF (Sender Policy Framework)
specification as found at:
http://www.ietf.org/internet-drafts/draft-mengwong-spf-00.txt
SPF allows email systems to check SPF DNS records and make sure that
an email is authorized by the administrator of the domain name that
it is coming from. This prevents email forgery, commonly used by
spammers, scammers, and email viruses/worms.
A lot of effort has been put into making it secure by design, and a
great deal of effort has been put into the regression tests.
--------------------------------------------------------------------------------
Update Information:
Update to latest in git.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Sep 22 2021 Bojan Smojver - 1.2.11-1.20210922git4915c308
- Build latest upstream git HEAD
- CVE-2021-20314
* Thu Jul 22 2021 Fedora Release Engineering - 1.2.10-30.20150405gitd57d79fd
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri May 21 2021 Jitka Plesnikova - 1.2.10-29.20150405gitd57d79fd
- Perl 5.34 rebuild
* Tue Jan 26 2021 Fedora Release Engineering - 1.2.10-28.20150405gitd57d79fd
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1993071 - CVE-2021-20314 libspf2: stack buffer overflow when processing SPF explanation macros [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1993071
[ 2 ] Bug #1993072 - CVE-2021-20314 libspf2: stack buffer overflow when processing SPF explanation macros [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1993072
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-044be3d54e' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
A libspf2 security update has been released for Fedora 33.