Fedora Linux 8779 Published by

A libspf2 security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: libspf2-1.2.11-1.20210922git4915c308.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-994751581f
2021-09-30 01:12:40.914660
--------------------------------------------------------------------------------

Name : libspf2
Product : Fedora 34
Version : 1.2.11
Release : 1.20210922git4915c308.fc34
URL :   http://www.libspf2.org/
Summary : An implementation of the SPF specification
Description :
libspf2 is an implementation of the SPF (Sender Policy Framework)
specification as found at:
  http://www.ietf.org/internet-drafts/draft-mengwong-spf-00.txt
SPF allows email systems to check SPF DNS records and make sure that
an email is authorized by the administrator of the domain name that
it is coming from. This prevents email forgery, commonly used by
spammers, scammers, and email viruses/worms.

A lot of effort has been put into making it secure by design, and a
great deal of effort has been put into the regression tests.

--------------------------------------------------------------------------------
Update Information:

Update to latest in git.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 22 2021 Bojan Smojver - 1.2.11-1.20210922git4915c308
- Build latest upstream git HEAD
- CVE-2021-20314
* Thu Jul 22 2021 Fedora Release Engineering - 1.2.10-30.20150405gitd57d79fd
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri May 21 2021 Jitka Plesnikova - 1.2.10-29.20150405gitd57d79fd
- Perl 5.34 rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1993071 - CVE-2021-20314 libspf2: stack buffer overflow when processing SPF explanation macros [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1993071
[ 2 ] Bug #1993072 - CVE-2021-20314 libspf2: stack buffer overflow when processing SPF explanation macros [epel-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1993072
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-994751581f' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys