openSUSE-SU-2019:1831-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:1831-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2019:1831-1
Related
Published
2019-08-06T15:40:29Z
Modified
2019-08-06T15:40:29Z
Summary
Security update for spamassassin
Details

This update for spamassassin to version 3.4.2 fixes the following issues:

Security issues fixed:

  • CVE-2018-11781: Fixed an issue where a local user could inject code in the meta rule syntax (bsc#1108748).
  • CVE-2018-11780: Fixed a potential remote code execution vulnerability in the PDFInfo plugin (bsc#1108750).
  • CVE-2017-15705: Fixed a denial of service through unclosed tags in crafted emails (bsc#1108745).
  • CVE-2016-1238: Fixed an issue where perl would load modules from the current directory (bsc#1108749).

Non-security issues fixed:

  • Use systemd timers instead of cron (bsc#1115411)
  • Fixed incompatibility with Net::DNS >= 1.01 (bsc#1107765)
  • Fixed warning about deprecated regex during sa-update (bsc#1069831)

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.0 / spamassassin

Package

Name
spamassassin
Purl
purl:rpm/suse/spamassassin&distro=openSUSE%20Leap%2015.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.2-lp150.6.3.1

Ecosystem specific

{
    "binaries": [
        {
            "spamassassin": "3.4.2-lp150.6.3.1",
            "perl-Mail-SpamAssassin-Plugin-iXhash2": "2.05-lp150.6.3.1",
            "perl-Mail-SpamAssassin": "3.4.2-lp150.6.3.1"
        }
    ]
}