Debian Linux Security Advisory 4955-1 - Philipp Jeitner and Haya Shulman discovered a stack-based buffer overflow in libspf2, a library for validating mail senders with SPF, which could result in denial of service, or potentially execution of arbitrary code when processing a specially crafted SPF record.
6564d32f37928be06a9316fcdbbad6ae35a20a9b97b6589dd788e5a94c66328e
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4955-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 11, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libspf2
CVE ID : CVE-2021-20314
Philipp Jeitner and Haya Shulman discovered a stack-based buffer
overflow in libspf2, a library for validating mail senders with SPF,
which could result in denial of service, or potentially execution of
arbitrary code when processing a specially crafted SPF record.
For the stable distribution (buster), this problem has been fixed in
version 1.2.10-7.1~deb10u1.
We recommend that you upgrade your libspf2 packages.
For the detailed security status of libspf2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libspf2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=NlkE
-----END PGP SIGNATURE-----