Lucene search

K
suseSuseOPENSUSE-SU-2019:0297-1
HistoryMar 06, 2019 - 12:00 a.m.

Security update for amavisd-new (moderate)

2019-03-0600:00:00
lists.opensuse.org
162

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.4%

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for amavisd-new fixes the following issues:

Security issue fixed:

  • CVE-2016-1238: Workedaround a perl vulnerability by removing a trailing
    dot element from @INC (bsc#987887).

Other issues addressed:

  • update to version 2.11.1 (bsc#1123389).

  • amavis-services: bumping up syslog level from LOG_NOTICE to LOG_ERR for
    a message “PID <pid> went away”, and removed redundant newlines from
    some log messages

  • avoid warning messages “Use of uninitialized value in subroutine entry”
    in Encode::MIME::Header when the $check argument is undefined

  • @sa_userconf_maps has been extended to allow loading of per-recipient
    (or per-policy bank, or global) SpamAssassin configuration set from
    LDAP. For consistency with SQL a @sa_userconf_maps entry prefixed with
    ‘ldap:’ will load SpamAssassin configuration set using the
    load_scoreonly_ldap() method.

  • add some Sanesecurity.Foxhole false positives to the default list
    @virus_name_to_spam_score_maps

  • update amavis-milter to version 2.6.1:

    • Fixed a bug when creating amavisd-new policy bank names

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-297=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.0x86_64< - openSUSE Leap 15.0 (x86_64):- openSUSE Leap 15.0 (x86_64):.x86_64.rpm

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.4%