Bug 32700 - sendmail new security issue CVE-2023-51765
Summary: sendmail new security issue CVE-2023-51765
Status: NEW
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Christiaan Welvaart
QA Contact: Sec team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-08 10:06 CET by Nicolas Salguero
Modified: 2024-03-29 11:51 CET (History)
1 user (show)

See Also:
Source RPM: sendmail-8.17.1-4.mga9.src.rpm
CVE: CVE-2023-51765
Status comment: Fixed in Version 8.18.0.2


Attachments

Description Nicolas Salguero 2024-01-08 10:06:49 CET
Version 8.18.0.2 fixes the new SMTP smuggling attack:
https://www.openwall.com/lists/oss-security/2023/12/21/6
https://www.openwall.com/lists/oss-security/2023/12/26/5
Nicolas Salguero 2024-01-08 10:07:36 CET

Whiteboard: (none) => MGA9TOO
Source RPM: (none) => sendmail-8.17.2-1.mga10.src.rpm
CVE: (none) => CVE-2023-51765

Comment 1 Lewis Smith 2024-01-08 20:18:19 CET
Christiaan put up the current version, and looks to be the main sendmail maintainer; assigning to you.

Status comment: (none) => Fixed in Version 8.18.0.2
Assignee: bugsquad => cjw

Comment 2 Pierre Fortin 2024-03-06 21:21:56 CET
also applies to Postfix: http://www.postfix.org/smtp-smuggling.html
https://nvd.nist.gov/vuln/detail/CVE-2023-51764

and exim: https://nvd.nist.gov/vuln/detail/CVE-2023-51766

CC: (none) => pfortin

Comment 3 Nicolas Salguero 2024-03-07 09:11:31 CET
(In reply to Pierre Fortin from comment #2)
> also applies to Postfix: http://www.postfix.org/smtp-smuggling.html
> https://nvd.nist.gov/vuln/detail/CVE-2023-51764

That issue was already fixed in bug 32647.

> and exim: https://nvd.nist.gov/vuln/detail/CVE-2023-51766

exim is not provided by Mageia.

Best regards,
Nicolas Salguero 2024-03-29 11:51:09 CET

Whiteboard: MGA9TOO => (none)
Source RPM: sendmail-8.17.2-1.mga10.src.rpm => sendmail-8.17.1-4.mga9.src.rpm
Version: Cauldron => 9


Note You need to log in before you can comment on or make changes to this bug.