{"containers":{"cna":{"affected":[{"product":"libspf2","vendor":"n/a","versions":[{"status":"affected","version":"1.2.11"}]}],"descriptions":[{"lang":"en","value":"Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages."}],"problemTypes":[{"descriptions":[{"description":"stack buffer overflow","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2024-01-15T17:06:16.537Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993070"},{"name":"FEDORA-2021-aa8637c985","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMSFT2NJDZ7PATRZSQPAOGSE7JD6ELOB/"},{"name":"FEDORA-2021-994751581f","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJRHPE5OSCPTNA3ZZ4ORDHT4JQH3Y4/"},{"name":"FEDORA-2021-044be3d54e","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6T4HYXXSUQCGJB2ES6X7Q74YYF7V7XU/"},{"url":"https://security.gentoo.org/glsa/202401-22"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:37:23.882Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993070"},{"name":"FEDORA-2021-aa8637c985","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMSFT2NJDZ7PATRZSQPAOGSE7JD6ELOB/"},{"name":"FEDORA-2021-994751581f","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJRHPE5OSCPTNA3ZZ4ORDHT4JQH3Y4/"},{"name":"FEDORA-2021-044be3d54e","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6T4HYXXSUQCGJB2ES6X7Q74YYF7V7XU/"},{"url":"https://security.gentoo.org/glsa/202401-22","tags":["x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2021-20314","datePublished":"2021-08-12T14:37:09.000Z","dateReserved":"2020-12-17T00:00:00.000Z","dateUpdated":"2025-02-13T16:27:45.177Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}