USN-6584-1 fixed several vulnerabilities in Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. This update provides the corresponding updates for CVE-2021-33912 and CVE-2021-33913 in Ubuntu 16.04 LTS.
We apologize for the inconvenience.
Original advisory details:
Philipp Jeitner and Haya Shulman discovered that Libspf2 incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2021-20314)
It was discovered that Libspf2 incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-33912, CVE-2021-33913)
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libmail-spf-xs-perl" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libmail-spf-xs-perl-dbgsym" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libspf2-2" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libspf2-2-dbg" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libspf2-2-dbgsym" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libspf2-dev" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "libspf2-dev-dbgsym" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "spfquery" }, { "binary_version": "1.2.10-6ubuntu0.1~esm2", "binary_name": "spfquery-dbgsym" } ] }