First published: Wed Jan 31 2024(Updated: )
USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of regression has been made available since the last update. This update updates the fix and aligns with the latest configuration guidelines regarding this vulnerability. We apologize for the inconvenience. Original advisory details: Timo Longin discovered that Postfix incorrectly handled certain email line endings. A remote attacker could possibly use this issue to bypass an email authentication mechanism, allowing domain spoofing and potential spamming. Please note that certain configuration changes are required to address this issue. They are not enabled by default for backward compatibility. Information can be found at https://www.postfix.org/smtp-smuggling.html.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/postfix | <3.8.1-2ubuntu0.2 | 3.8.1-2ubuntu0.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/postfix | <3.6.4-1ubuntu1.3 | 3.6.4-1ubuntu1.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/postfix | <3.4.13-0ubuntu1.4 | 3.4.13-0ubuntu1.4 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/postfix | <3.3.0-1ubuntu0.4+esm3 | 3.3.0-1ubuntu0.4+esm3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/postfix | <3.1.0-3ubuntu0.4+esm3 | 3.1.0-3ubuntu0.4+esm3 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/postfix | <2.11.0-1ubuntu1.2+esm3 | 2.11.0-1ubuntu1.2+esm3 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.