| Package | postfix | 
|---|---|
| Version | 2.11.3-1+deb8u3 (jessie), 3.1.15-0+deb9u2 (stretch) | 
| Related CVEs | CVE-2023-51764 | 
Postfix, a popular mail server, was vulnerable.
Postfix allowed SMTP smuggling unless configured with
smtpd_data_restrictions=reject_unauth_pipelining and
smtpd_discard_ehlo_keywords=chunking.
Remote attackers can use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism.
This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not.
To prevent attack variants (by always disallowing <LF> without <CR>),
a different solution is required, such as using the backported smtpd_forbid_bare_newline=yes option.
For Debian 8 jessie, these problems have been fixed in version 2.11.3-1+deb8u3.
For Debian 9 stretch, these problems have been fixed in version 3.1.15-0+deb9u2.
We recommend that you upgrade your postfix packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.