MGASA-2019-0406

Source
https://advisories.mageia.org/MGASA-2019-0406.html
Import Source
https://advisories.mageia.org/MGASA-2019-0406.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0406
Related
Published
2019-12-24T12:24:34Z
Modified
2019-12-24T12:05:39Z
Summary
Updated spamassassin packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rdparty .cf files from trusted places. (CVE-2018-11805)

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly. (CVE-2019-12420)

References
Credits

Affected packages

Mageia:7 / spamassassin

Package

Name
spamassassin
Purl
pkg:rpm/mageia/spamassassin?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.3-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / spamassassin-rules

Package

Name
spamassassin-rules
Purl
pkg:rpm/mageia/spamassassin-rules?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.3-1.mga7

Ecosystem specific

{
    "section": "core"
}