Commit Graph

16 Commits

Author SHA1 Message Date
steven
3769b440d9 update to SpamAssassin 3.1.3
ok maintainer Andreas Voegele
2006-06-06 17:33:41 +00:00
steven
be05407a0a maintenance update to 3.1.1
from: new maintainer Andreas Voegele (voegelas at gmx dot net)
2006-03-20 20:18:29 +00:00
mbalmer
12027718bf Update to SpamAssassin 3.1.0.
Release notes available:
http://marc.theaimsgroup.com/?l=spamassassin-announce&m=112674318914008&w=2

From Ben Lovett <ben at tilderoot dot com>
2005-10-09 09:05:43 +00:00
sturm
9accab25a8 update to SpamAssassin 3.01
from maintainer Ben Lovett <ben at tilderoot.com>
2004-10-31 08:44:44 +00:00
brad
189876eb88 upgrade p5-Mail-SpamAssassin to 2.61
--
From: new MAINTAINER Ben Lovett <ben at tilderoot dot com>
2003-12-27 04:17:01 +00:00
lebel
fc9a955289 same line twice, is it really needed?; from MAINTAINER 2003-08-01 11:25:50 +00:00
avsm
69b6e1fd53 sync with spamassassin-cvs for the bounds bugfix (#2041 in their bugzilla):
allocate an extra byte for the array instead of reducing the bounds value
2003-06-19 01:03:22 +00:00
avsm
f980ac559f fix a couple of off-by-one in spamc->spamd communication
submitted upstream, bugzilla #2074 in their bug db
bump PKGNAME
2003-06-17 16:33:04 +00:00
brad
de8d6c8811 upgrade p5-Mail-SpamAssassin to 2.55
--
MAINTAINER ok
2003-05-23 23:36:31 +00:00
lebel
b8665d4e54 update p5-Mail-SpamAssassin to 2.44; from MAINTAINER 2003-02-03 20:28:24 +00:00
lebel
f6137b44bd Added patch from Timo Sirainen <tss@iki.fi> to fix exploit.
---cut---
Well, I was going to wait until 2.50 release, but it seems to be taking and
this likely affects only few installations. Besides, it's been in their
public bugzilla for over a month. So:

Attacker may be able to execute arbitrary code by sending a specially
crafted e-mail to a system using SpamAssassin's spamc program in BSMTP mode
(-B option). Versions from 2.40 to 2.43 are affected.

Exim users especially should check if they're affected, the -B option is
used in several Exim+SpamAssassin HOWTOs.

The problem is with escaping '.' characters at the beginning of lines.
Off-by-one bounds checking error allows writing '.' character past a
buffer, overwriting the stack frame address. Depending on system this may
be exploitable. Pre-built Debian unstable/x86 package wasn't vulnerable, my
self compiled was.
---cut---
2003-01-26 16:43:45 +00:00
wcobb
96daa31089 Install the man pages for spamd/spamc, move spamd to section 8.
ok maintainer
2002-12-03 07:10:06 +00:00
lebel
7063f80be8 update mail/p5-Mail-SpamAssassin to 2.40:
--
The #1 big change:

- SpamAssassin now *REQUIRES* procmail  for  local  delivery  support;
  -P  option  is  now  the  default.  Unless   you   use   procmail,
  Mail::Audit, KMail, or an  MTA-level  integration,  do  not  upgrade

From maintainer, Han Boetes <han@boetes.org>
2002-09-02 21:16:16 +00:00
lebel
451fe00889 update mail/p5-Mail-SpamAssassin to 2.30; maintainer OK'ed the update 2002-06-17 22:08:59 +00:00
wilfried
9695da9cae Update to p5-Mail-SpamAssassin-2.20, from maintainer Han Boetes <han@mijncomputer.nl> 2002-05-02 15:26:36 +00:00
wilfried
4916c574b7 Import of p5-Mail-SpamAssassin-2.11, from maintainer Han Boetes <han@mijncomputer.nl>
SpamAssassin is a mail filter to identify spam.

Using its rule base, it uses a wide range of heuristic tests on
mail headers and body text to identify "spam", also known as
unsolicited commercial email.
2002-04-19 21:39:20 +00:00