Debian LTS: DLA-3725-1: postfix security update
Summary
Remote attackers can use a published exploitation technique to
inject e-mail messages with a spoofed MAIL FROM address,
allowing bypass of an SPF protection mechanism.
This occurs because Postfix supported
some other popular e-mail servers do not.
To prevent attack variants (by always disallowing
a different solution is required, such as setting the backported
configuration option smtpd_forbid_bare_newline=yes
For Debian 10 buster, this problem has been fixed in version
3.4.23-0+deb10u2.
We recommend that you upgrade your postfix packages.
For the detailed security status of postfix please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/postfix
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS