Gentoo Linux Security Advisory GLSA 200810-03 - A memory management error in libspf2 might allow for remote execution of arbitrary code. libspf2 uses a fixed-length buffer to receive DNS responses and does not properly check the length of TXT records, leading to buffer overflows. Versions less than 1.2.8 are affected.
b89962e08445793c2f2fcc7517fcbf293f1324a4ae151bb01f811dca7181f51f
Debian Security Advisory 1659-1 - Dan Kaminsky discovered that libspf2, an implementation of the Sender Policy Framework (SPF) used by mail servers for mail filtering, handles malformed TXT records incorrectly, leading to a buffer overflow condition.
85f625795498a82b65ac9c2ce0ec08ff449ac30f222b7506bc9b1011ed657f13