[CLSA-2025:1738267482] postfix: Fix of CVE-2023-51764
Type:
security
Severity:
Moderate
Release date:
2025-01-30 20:04:49 UTC
Description:
- CVE-2023-51764: Improvements for inbound SMTP smuggling defense. Reject or restrict input lines from an SMTP client that end in bare new line. Replace each stray or character in message content with a space character, to prevent outbound SMTP smuggling To prevent the SMTP smuggling vulnerability, the option "smtpd_forbid_bare_newline = reject" must be set.
Updated packages:
  • postfix-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:a1684dcc97c8e330635b9fc23a1533ffb6610e422778ed8e2463b75272279585
  • postfix-cdb-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:6ee36cd406f1f73dc693e772f619b50e2c82ca9bc3631621c4683f3e64fbfe29
  • postfix-ldap-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:d70314854db7e543ac2cfbb047f2fe4ba3d2fa65b4d6e8c5e971e3dcfe0f4f24
  • postfix-lmdb-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:e16bcb454d94a895fc7279637d6845342f9daa72edbc94e2af08a34ea2058581
  • postfix-mysql-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:b0594dd137dc720aacf35ee1d559f5f60294a788a59fb395c581efd807f0d5d3
  • postfix-pcre-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:4cdefcbff8ad2494552bf4f3f47dfddab053ddf4b9882abf86f87419320b497e
  • postfix-perl-scripts-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:d328ad3b6e32cf1260f98514a16698749b6bbfbae39e6427de57a5ba5ecbbc11
  • postfix-pgsql-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:5a56f02635e651d1db047e8d9f5e39fcbfce23c82cde7213457f684f6bc199bd
  • postfix-sqlite-3.5.9-19.el9.tuxcare.els1.x86_64.rpm
    sha:393e86794d0c5dcc9a7ca4f80668410a8f11965008324bf6bd6d1e2806300309
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.