CVE-2019-16791: postfix-mta-sts-resolver Algorithm Downgrade vulnerability
(updated )
All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
References
- gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b
- github.com/Snawoot/postfix-mta-sts-resolver
- github.com/Snawoot/postfix-mta-sts-resolver/security/advisories/GHSA-h92m-42h4-82f6
- github.com/advisories/GHSA-h92m-42h4-82f6
- github.com/pypa/advisory-database/tree/main/vulns/postfix-mta-sts-resolver/PYSEC-2020-174.yaml
- nvd.nist.gov/vuln/detail/CVE-2019-16791
Detect and mitigate CVE-2019-16791 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →