Mageia 2019-0406: spamassassin security update
Summary
The updated packages fix security vulnerabilities:
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured
to run system commands without any output or errors. With this, exploits
can be injected in a number of scenarios. In addition to upgrading to SA
3.4.3, we recommend that users should only use update channels or 3rdparty
.cf files from trusted places. (CVE-2018-11805)
In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to
use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the
recommended fix but details will not be shared publicly. (CVE-2019-12420)
References
- https://bugs.mageia.org/show_bug.cgi?id=25860
- https://www.openwall.com/lists/oss-security/2019/12/12/1
- https://www.openwall.com/lists/oss-security/2019/12/12/2
- https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt
- https://www.debian.org/security/2019/dsa-4584
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11805
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420
Resolution
MGASA-2019-0406 - Updated spamassassin packages fix security vulnerabilities
SRPMS
- 7/core/spamassassin-3.4.3-1.mga7
- 7/core/spamassassin-rules-3.4.3-1.mga7