From 9cdf086497a5ec3652db4ca75fc899675aa0af77 Mon Sep 17 00:00:00 2001 From: GLSAMaker Date: Mon, 15 Jan 2024 15:55:55 +0000 Subject: [ GLSA 202401-22 ] libspf2: Multiple vulnerabilities Bug: https://bugs.gentoo.org/807739 Signed-off-by: GLSAMaker Signed-off-by: Hans de Graaff --- glsa-202401-22.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 glsa-202401-22.xml diff --git a/glsa-202401-22.xml b/glsa-202401-22.xml new file mode 100644 index 00000000..bbffaf30 --- /dev/null +++ b/glsa-202401-22.xml @@ -0,0 +1,44 @@ + + + + libspf2: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libspf2, the worst of which can lead to remote code execution. + libspf2 + 2024-01-15 + 2024-01-15 + 807739 + remote + + + 1.2.11 + 1.2.11 + + + +

libspf2 is a library that implements the Sender Policy Framework, allowing mail transfer agents to make sure that an email is authorized by the domain name that it is coming from.

+
+ +

Multiple vulnerabilities have been discovered in libspf2. Please review the CVE identifiers referenced below for details.

+
+ +

Various buffer overflows have been identified that can lead to denial of service and possibly arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libspf2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.11" + +
+ + CVE-2021-20314 + CVE-2021-33912 + CVE-2021-33913 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3-65-gdbad