DSA-4955-1 libspf2 -- security update

Related Vulnerabilities: CVE-2021-20314  

Philipp Jeitner and Haya Shulman discovered a stack-based buffer overflow in libspf2, a library for validating mail senders with SPF, which could result in denial of service, or potentially execution of arbitrary code when processing a specially crafted SPF record. For the stable distribution (buster), this problem has been fixed in version 1.2.10-7.1~deb10u1. We recommend that you upgrade your libspf2 packages. For the detailed security status of libspf2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libspf2

Debian Security Advisory

DSA-4955-1 libspf2 -- security update

Date Reported:
11 Aug 2021
Affected Packages:
libspf2
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2021-20314.
More information:

Philipp Jeitner and Haya Shulman discovered a stack-based buffer overflow in libspf2, a library for validating mail senders with SPF, which could result in denial of service, or potentially execution of arbitrary code when processing a specially crafted SPF record.

For the stable distribution (buster), this problem has been fixed in version 1.2.10-7.1~deb10u1.

We recommend that you upgrade your libspf2 packages.

For the detailed security status of libspf2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libspf2