Skip to navigation

Bug Fix Advisory spamassassin bug fix and enhancement update

Advisory: RHBA-2011:1035-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated spamassassin package that fixes various bugs and adds an enhancement
is now available for Red Hat Enterprise Linux 5.

SpamAssassin provides a way to filter unsolicited email (spam messages) from
incoming email.

The spamassassin package has been upgraded to the upstream version 3.3.1, which
includes the default upstream rules and provides a number of bug fixes over the
previous version. In order to keep the rules up-to-date, it is strongly
recommended to allow the nightly rules update. This can be done by removing the
comment sign from the following line in the /etc/cron.d/sa-update file:

#10 4 * * * root /usr/share/spamassassin/sa-update.cron 2>&1 | tee -a
/var/log/sa-update.log

The regular update of the upstream rules ensures the SpamAssassin's best
functionality. (BZ#481616)

In addition, this updated package fixes the following bug:

* Due to an incorrect "FH_DATE_PAST_20XX" filter rule, many emails containing
the date 2010 in the message header were wrongly regarded as spam. According to
the rule, all email messages containing the date between 2010 and 2099 had the
spam score increased. To fix this problem, the rule "FH_DATE_PAST_20XX" has been
modified to reflect the current year. (BZ#552127)

All users of spamassassin are advised to upgrade to this updated package, which
resolves this issue and adds this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
spamassassin-3.3.1-2.el5.src.rpm
File outdated by:  RHBA-2013:1336
    MD5: dcce87c24adbd2437a7f68eec536dfd6
SHA-256: e6fe19398dae17347d073eae428bb0375938b391b77e4ee36d326a63c981f8aa
 
IA-32:
spamassassin-3.3.1-2.el5.i386.rpm
File outdated by:  RHBA-2013:1336
    MD5: 5cca2ffa45bc631458635b90f89e3ef3
SHA-256: 544ff7f4991c99e8768419c43b0d66ac742669fcd5c0c74c0be76ea50eaf8829
 
IA-64:
spamassassin-3.3.1-2.el5.ia64.rpm
File outdated by:  RHBA-2013:1336
    MD5: 6182014a19fca912daef2ade19ad8c20
SHA-256: 2ba2dea75088da51bafc0e8a1ad5a3f4fcc042aa6ffe726cc1ade571bc9f50ed
 
PPC:
spamassassin-3.3.1-2.el5.ppc.rpm
File outdated by:  RHBA-2013:1336
    MD5: 9b94b5ddff7d17078347ac79c439c283
SHA-256: 108d255559a3fe18db9110a61e3832a8b8c06dc968a416fc3b854c0d61bf865b
 
s390x:
spamassassin-3.3.1-2.el5.s390x.rpm
File outdated by:  RHBA-2013:1336
    MD5: 3b3a9bde98b04312891706d91dcea535
SHA-256: 055e4a956660c1a7201a08831194ecfe4a2a8cdd8d4f56ec7a18b1bab733263b
 
x86_64:
spamassassin-3.3.1-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1336
    MD5: 5967490e5fc38bea80c5e2898c733ba4
SHA-256: f9c3523ea9d5b299d8715b62668e7097bbe41191d19e2d4546f96a52d111c27d
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
spamassassin-3.3.1-2.el5.src.rpm
File outdated by:  RHBA-2013:1336
    MD5: dcce87c24adbd2437a7f68eec536dfd6
SHA-256: e6fe19398dae17347d073eae428bb0375938b391b77e4ee36d326a63c981f8aa
 
IA-32:
spamassassin-3.3.1-2.el5.i386.rpm
File outdated by:  RHBA-2013:1336
    MD5: 5cca2ffa45bc631458635b90f89e3ef3
SHA-256: 544ff7f4991c99e8768419c43b0d66ac742669fcd5c0c74c0be76ea50eaf8829
 
x86_64:
spamassassin-3.3.1-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1336
    MD5: 5967490e5fc38bea80c5e2898c733ba4
SHA-256: f9c3523ea9d5b299d8715b62668e7097bbe41191d19e2d4546f96a52d111c27d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

552127 - SpamAssassin new year 2010 issue with FH_DATE_PAST_20XX 0.0



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/