Security update for spamassassin
SUSE Security Update: Security update for spamassassin
Non-security issues fixed:
Announcement ID: | SUSE-SU-2019:2011-1 |
Rating: | moderate |
References: | #1069831 #1107765 #1108745 #1108748 #1108749 #1108750 #1115411 |
Cross-References: | CVE-2016-1238 CVE-2017-15705 CVE-2018-11780 CVE-2018-11781 |
Affected Products: |
|
An update that solves four vulnerabilities and has three fixes is now available.
Description:
This update for spamassassin to version 3.4.2 fixes the following issues:
Security issues fixed:
- CVE-2018-11781: Fixed an issue where a local user could inject code in the meta rule syntax (bsc#1108748).
- CVE-2018-11780: Fixed a potential remote code execution vulnerability in the PDFInfo plugin (bsc#1108750).
- CVE-2017-15705: Fixed a denial of service through unclosed tags in crafted emails (bsc#1108745).
- CVE-2016-1238: Fixed an issue where perl would load modules from the current directory (bsc#1108749).
Non-security issues fixed:
- Use systemd timers instead of cron (bsc#1115411)
- Fixed incompatibility with Net::DNS >= 1.01 (bsc#1107765)
- Fixed warning about deprecated regex during sa-update (bsc#1069831)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Development Tools 15:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2019-2011=1
- SUSE Linux Enterprise Module for Basesystem 15:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-2011=1
Package List:
- SUSE Linux Enterprise Module for Development Tools 15 (aarch64 ppc64le s390x x86_64):
- perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-7.4.1
- SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):
- perl-Mail-SpamAssassin-3.4.2-7.4.1
- spamassassin-3.4.2-7.4.1
- spamassassin-debuginfo-3.4.2-7.4.1
- spamassassin-debugsource-3.4.2-7.4.1
References:
- https://www.suse.com/security/cve/CVE-2016-1238.html
- https://www.suse.com/security/cve/CVE-2017-15705.html
- https://www.suse.com/security/cve/CVE-2018-11780.html
- https://www.suse.com/security/cve/CVE-2018-11781.html
- https://bugzilla.suse.com/1069831
- https://bugzilla.suse.com/1107765
- https://bugzilla.suse.com/1108745
- https://bugzilla.suse.com/1108748
- https://bugzilla.suse.com/1108749
- https://bugzilla.suse.com/1108750
- https://bugzilla.suse.com/1115411