You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa opendmarc

Sigurnosni nedostatak programskog paketa opendmarc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-e1f0417a24
2019-10-12 01:28:44.976780
——————————————————————————–

Name : opendmarc
Product : Fedora 29
Version : 1.3.2
Release : 1.fc29
URL : http://www.trusteddomain.org/opendmarc.html
Summary : A Domain-based Message Authentication, Reporting & Conformance (DMARC) milter and library
Description :
OpenDMARC (Domain-based Message Authentication, Reporting & Conformance)
provides an open source library that implements the DMARC verification
service plus a milter-based filter application that can plug in to any
milter-aware MTA, including sendmail, Postfix, or any other MTA that supports
the milter protocol.

The DMARC sender authentication system is still a draft standard, working
towards RFC status.

The database schema required for some functions is provided in
/usr/share/opendmarc/db. The rddmarc tools are provided in
/usr/share/opendmarc/contrib/rddmarc.

——————————————————————————–
Update Information:

This update provides the final 1.3.2 release (previously the package was 1.3.2
beta). It also includes the previously-omitted database schema directory
(resolving [#1415753](https://bugzilla.redhat.com/show_bug.cgi?id=1415753)) and
rddmarc tools, and backports proposed fixes for a [crasher
bug](https://bugzilla.redhat.com/show_bug.cgi?id=1673293) and [security issue
CVE-2019-16378](https://bugzilla.redhat.com/show_bug.cgi?id=1753081) from
upstream submissions.
——————————————————————————–
ChangeLog:

* Fri Oct 4 2019 Adam Williamson <awilliam@redhat.com> – 1.3.2-1
– Update to 1.3.2 final (belatedly)
– Drop patches merged upstream
– Backport proposed fix for upstream #227 (RHBZ #1673293)
– Backport proposed fix for CVE-2019-16378 (RHBZ #1753082 and #1753081)
– Ship database schema and rddmarc bits (#1415753)
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.2-0.20
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Fri Feb 1 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.2-0.19
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1753081 – CVE-2019-16378 opendmarc: Signature-bypass vulnerability with multiple ‘From’ addresses [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1753081
[ 2 ] Bug #1673293 – libopendmarc crashes on certain malformed records
https://bugzilla.redhat.com/show_bug.cgi?id=1673293
[ 3 ] Bug #1415753 – schema.mysql not in rpm
https://bugzilla.redhat.com/show_bug.cgi?id=1415753
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-e1f0417a24’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke libapreq2

Otkriven je sigurnosni nedostatak programske biblioteke libapreq2 za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja. Savjetuje...

Close