libcurl is vulnerable to a buffer overflow in the implementation of POP3, SMTP or IMAP protocol.
Airlock is using libcurl to communicate with HTTP(S) to back-end systems. Exploits have shown that a vulnerable back-end system could send redirects to a malicious mailserver which then performs the described buffer overflow. Since Airlock does not follow redirects from back-end systems this vulnerability does not affect Airlock. Redirects are sent to the client - an incoming POP3/SMTP/IMAP request to Airlock will be refused in any case.
No action is needed