*** This bug is a security vulnerability ***

Public security bug reported:

Release 3.4.2 includes a number of CVE fixes.

These need to be backported to other stable releases.

> spamassassin (3.4.2-1) unstable; urgency=medium
> 
>   * New upstream release fixes multiple security vulnerabilities
>     - CVE-2017-15705: Denial of service issue in which certain unclosed
>       tags in emails cause markup to be handled incorrectly leading to
>       scan timeouts. (Closes: 908969)
>     - CVE-2016-1238: Unsafe usage of "." in @INC in a configuration
>       script.
>     - CVE-2018-11780: potential Remote Code Execution bug with the
>       PDFInfo plugin. (Closes: 908970)
>     - CVE-2018-11781: local user code injection in the meta rule syntax.
>       (Closes: 908971)
>     - BayesStore: bayes_expire table grows, remove_running_expire_tok not
>       called (Closes: 883775)
>     - Fix use of uninitialized variable warning in PDFInfo.pm
>       (Closes: 865924)
>     - Fix "failed to parse plugin" error in
>       Mail::SpamAssassin::Plugin::URILocalBL (Closes: 891041)
>   * Don't recursively chown /var/lib/spamassassin during postinst.
>     (Closes: 889501)
>   * Reload spamd after compiling rules in sa-compile.postinst.
>   * Preserve locally set ENABLED=1 setting from /etc/default/spamassassin
>     when installing on systemd-based systems. (Closes: 884163, 858457)
>   * Update SysV init script to cope with upstream's change to $0.
>   * Remove compiled rules upon removal of the sa-compile package.
>   * Ensure that /var/lib/spamassassin/compiled doesn't change modes with
>     the cron job's execution. (Closes: 890650)
>   * Update standards version to 4.2.1
>   * Create /var/lib/spamassassin via dpkg, rather than the postinst.
>     (Closes: 891833)
> 
>  -- Noah Meyerhans <no...@debian.org>  Sun, 30 Sep 2018 23:44:58 -0700

** Affects: spamassassin (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11781

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15705

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-1238

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11780

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801906

Title:
  Backport 3.4.2 CVE fixes to stable releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1801906/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to