diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2024-01-31 21:19:19 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2024-02-01 13:30:49 +0100 |
commit | 4af705d201f28b1b12ac1ba92fb9afea3b88fe29 (patch) | |
tree | 50fc9ebf6279b33289c54ada5da78ce044cd5c17 /source/l/Mako | |
parent | 71cfddeb9faf318dd1d2b11c61a2202fd580b653 (diff) | |
download | current-4af705d201f28b1b12ac1ba92fb9afea3b88fe29.tar.gz current-4af705d201f28b1b12ac1ba92fb9afea3b88fe29.tar.xz |
Wed Jan 31 21:19:19 UTC 202420240131211919_15.0
extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz: Upgraded.
sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject e-mail
messages with a spoofed MAIL FROM address, allowing bypass of an SPF
protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
but some other popular e-mail servers do not. This is resolved in 8.18 and
later versions with 'o' in srv_features.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-51765
(* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded.
patches/packages/curl-8.6.0-x86_64-1_slack15.0.txz: Upgraded.
This is a bugfix release.
patches/packages/libmilter-8.18.1-x86_64-1_slack15.0.txz: Upgraded.
This is a bugfix release.
Diffstat (limited to 'source/l/Mako')
0 files changed, 0 insertions, 0 deletions