Package: spamassassin / 3.4.2-1+deb10u3
Metadata
Package | Version | Patches format |
---|---|---|
spamassassin | 3.4.2-1+deb10u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
10_change_config_paths | (download) |
INSTALL |
2 1 + 1 - 0 ! |
--- |
20_edit_spamc_pod | (download) |
spamc/spamc.pod |
2 1 + 1 - 0 ! |
--- |
55_disable_nagios_epm | (download) |
sa-check_spamd.raw |
5 5 + 0 - 0 ! |
--- |
90_pod_cleanup | (download) |
lib/Mail/SpamAssassin/Conf.pm |
2 1 + 1 - 0 ! |
--- |
98_sa compile quiet | (download) |
lib/Mail/SpamAssassin/Plugin/BodyRuleBaseExtractor.pm |
3 2 + 1 - 0 ! |
--- |
bug_766718 net dns vers | (download) |
lib/Mail/SpamAssassin/Dns.pm |
5 3 + 2 - 0 ! |
improve net::dns package version checks. This isn't strictly necessary right now, but does make version checks more robust and should be forwarded upstream. In multiple places, spamassassin contains tests against $Net::DNS::VERSION that assume the value is numeric. It is not guaranteed to be numeric, and in cases where it isn't the tests trigger warnings. Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766718 |
CVE 2018 11805 | (download) |
lib/Mail/SpamAssassin/Conf.pm |
189 94 + 95 - 0 ! |
patch for cve-2018-11805 Malicious rules could execute arbitrary commands under multiple circumstances. |
CVE 2019 12420 | (download) |
lib/Mail/SpamAssassin/Message.pm |
8 8 + 0 - 0 ! |
limit checked mime parts |
CVE 2020 1930 | (download) |
lib/Mail/SpamAssassin/Plugin/OneLineBodyRuleType.pm |
16 9 + 7 - 0 ! |
--- |
CVE 2020 1931 | (download) |
lib/Mail/SpamAssassin/Conf.pm |
14 14 + 0 - 0 ! |
--- |
spamd_tests_use_unprivileged_port.diff | (download) |
t/spamd_ssl.t |
4 2 + 2 - 0 ! |
allow tls tests to run as non-root user The spamd TLS tests involve starting spamd and binding to a TCP port. Spamd's default TCP port is 783, and this is not overridden in the test, so the test must run as root in order for the bind() call to work. Since the specific port isn't important for the test, we'll override it here to use a non-privileged port. |
spamd_tests_use_rsa2048_self signed_cert | (download) |
t/data/etc/testhost.cert |
44 23 + 21 - 0 ! |
update the self-signed x509 cert used for tests The spamassassin sources embed a self-signed x509 certificate used by the test suite to validate connectivity with spamc. Versions of openssl on Debian won't load 1024 bits by default, so we replace the original certificate with a 2048 bit one, maintaining the rest of the DN parameters unchanged. |
CVE 2020 1946.patch | (download) |
lib/Mail/SpamAssassin/Conf/Parser.pm |
7 4 + 3 - 0 ! |
fix header rule parsing |