-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  postfix (SSA:2024-022-01)

New postfix packages are available for Slackware 15.0 and -current to
fix a security issue.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/postfix-3.6.14-i586-1_slack15.0.txz:  Upgraded.
  Security (inbound SMTP smuggling): with "smtpd_forbid_bare_newline
  = normalize" (default "no" for Postfix < 3.9), the Postfix
  SMTP server requires the standard End-of-DATA sequence
  ., and otherwise allows command or message
  content lines ending in the non-standard , processing
  them as if the client sent the standard .
  The alternative setting, "smtpd_forbid_bare_newline = reject"
  will reject any command or message that contains a bare
  , and is more likely to cause problems with legitimate
  clients.
  For backwards compatibility, local clients are excluded by
  default with "smtpd_forbid_bare_newline_exclusions =
  $mynetworks".
  For more information, see:
    https://www.postfix.org/smtp-smuggling.html
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/postfix-3.6.14-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/postfix-3.6.14-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/postfix-3.8.5-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/postfix-3.8.5-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 15.0 package:
294738922ff08821267867f0bc877f20  postfix-3.6.14-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
e82bb102cc325850e48aca41f909e812  postfix-3.6.14-x86_64-1_slack15.0.txz

Slackware -current package:
7e088581a14eb986f767bc08d9203103  n/postfix-3.8.5-i586-1.txz

Slackware x86_64 -current package:
50f7d14d0ddc0ce62e29cb55a2cffa31  n/postfix-3.8.5-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg postfix-3.6.14-i586-1_slack15.0.txz

Restart the postfix server:
# /etc/rc.d/rc.postfix restart


+-----+

Slackware: 2024-022-01: postfix Security Update

January 22, 2024
New postfix packages are available for Slackware 15.0 and -current to fix a security issue

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/postfix-3.6.14-i586-1_slack15.0.txz: Upgraded. Security (inbound SMTP smuggling): with "smtpd_forbid_bare_newline = normalize" (default "no" for Postfix < 3.9), the Postfix SMTP server requires the standard End-of-DATA sequence ., and otherwise allows command or message content lines ending in the non-standard , processing them as if the client sent the standard . The alternative setting, "smtpd_forbid_bare_newline = reject" will reject any command or message that contains a bare , and is more likely to cause problems with legitimate clients. For backwards compatibility, local clients are excluded by default with "smtpd_forbid_bare_newline_exclusions = $mynetworks". For more information, see: https://www.postfix.org/smtp-smuggling.html (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/postfix-3.6.14-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/postfix-3.6.14-x86_64-1_slack15.0.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/postfix-3.8.5-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/postfix-3.8.5-x86_64-1.txz

MD5 Signatures

Slackware 15.0 package: 294738922ff08821267867f0bc877f20 postfix-3.6.14-i586-1_slack15.0.txz
Slackware x86_64 15.0 package: e82bb102cc325850e48aca41f909e812 postfix-3.6.14-x86_64-1_slack15.0.txz
Slackware -current package: 7e088581a14eb986f767bc08d9203103 n/postfix-3.8.5-i586-1.txz
Slackware x86_64 -current package: 50f7d14d0ddc0ce62e29cb55a2cffa31 n/postfix-3.8.5-x86_64-1.txz

Severity
[slackware-security] postfix (SSA:2024-022-01)
New postfix packages are available for Slackware 15.0 and -current to fix a security issue.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg postfix-3.6.14-i586-1_slack15.0.txz Restart the postfix server: # /etc/rc.d/rc.postfix restart

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo