First published: Thu Dec 21 2023(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/postfix | <=3.8.2-1<=3.4.23-0+deb10u1<=3.7.6-0+deb12u2<=3.5.18-0+deb11u1 | 3.8.4-1 3.7.9-0+deb12u1 3.5.23-0+deb11u1 |
redhat/postfix | <3.8.4 | 3.8.4 |
redhat/postfix | <3.7.9 | 3.7.9 |
redhat/postfix | <3.6.13 | 3.6.13 |
redhat/postfix | <3.5.23 | 3.5.23 |
Postfix Postfix | <3.5.23 | |
Postfix Postfix | >=3.6.0<3.6.13 | |
Postfix Postfix | >=3.7.0<3.7.9 | |
Postfix Postfix | >=3.8.0<3.8.4 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
debian/postfix | 3.5.25-0+deb11u1 3.7.11-0+deb12u1 3.9.0-3 |
Patched versions of Postfix before 3.9 require the below configs for the fix to apply: smtpd_forbid_bare_newline = normalize smtpd_forbid_bare_newline_exclusions = $mynetworks
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.