Release date:
2025-01-30 20:04:49 UTC
Description:
- CVE-2023-51764: Improvements for inbound SMTP smuggling defense.
Reject or restrict input lines from an SMTP client that end in bare new line.
Replace each stray or character in message
content with a space character, to prevent outbound SMTP smuggling
To prevent the SMTP smuggling vulnerability, the option "smtpd_forbid_bare_newline = reject" must be set.
Updated packages:
-
postfix-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:a1684dcc97c8e330635b9fc23a1533ffb6610e422778ed8e2463b75272279585
-
postfix-cdb-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:6ee36cd406f1f73dc693e772f619b50e2c82ca9bc3631621c4683f3e64fbfe29
-
postfix-ldap-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:d70314854db7e543ac2cfbb047f2fe4ba3d2fa65b4d6e8c5e971e3dcfe0f4f24
-
postfix-lmdb-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:e16bcb454d94a895fc7279637d6845342f9daa72edbc94e2af08a34ea2058581
-
postfix-mysql-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:b0594dd137dc720aacf35ee1d559f5f60294a788a59fb395c581efd807f0d5d3
-
postfix-pcre-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:4cdefcbff8ad2494552bf4f3f47dfddab053ddf4b9882abf86f87419320b497e
-
postfix-perl-scripts-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:d328ad3b6e32cf1260f98514a16698749b6bbfbae39e6427de57a5ba5ecbbc11
-
postfix-pgsql-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:5a56f02635e651d1db047e8d9f5e39fcbfce23c82cde7213457f684f6bc199bd
-
postfix-sqlite-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
sha:393e86794d0c5dcc9a7ca4f80668410a8f11965008324bf6bd6d1e2806300309
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.