drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in bogofilter
Name: |
Denial of Service in bogofilter |
|
ID: |
openSUSE-SU-2013:0166-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE 11.4 |
|
Datum: |
Mi, 23. Januar 2013, 21:09 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494 |
|
Applikationen: |
bogofilter |
|
Originalnachricht |
openSUSE Security Update: update for bogofilter ______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0166-1 Rating: important References: #792939 Cross-References: CVE-2010-2494 Affected Products: openSUSE 11.4/standard/i586/patchinfo.28 ______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
- Update to version 1.2.3. * Update configure.ac to avoid autoconf 2.68 warnings, by (a) quoting the first AC_RUN_IFELSE argument, an AC_LANG_PROGRAM(), with [ ], and (b) providing an explicit "true" assumption for Berkeley DB capabilities to avoid cross-compilation warnings. * Security bugfix; (bnc#792939), Fix a heap corruption in base64 decoder on invalid input. http://bogofilter.sourceforge.net/security/bogofilter-SA-201 2-01 * Added bogofilter-faq-bg.html, a Bulgarian translation of the FAQ. * Mark "Berkeley DB 5.1.19: (August 27, 2010)" supported. - Update to version 1.2.2. * Use a better PRNG for random sleeps. That is arc4random() where available, and drand48() elsewhere. * Assorted fixes for issues found with clang analyzer: + Fix a potential NULL deference + Fix a potential division by zero + Remove dead assignments and increments * Update Doxyfile and source contrib/bogogrep.c for docs, too. * Security bugfix, CVE-2010-2494: Fix a heap corruption in base64 decoder on invalid input. Analysis and patch by Julius Plenz <plenz@cis.fu-berlin.de>. Please see doc/bogofilter-SA-2010-01 for details. * Updated sendmail milter contrib/bogofilter-milter.pl to v1.?????? * Bump supported/minimum SQLite3 versions and warning threshold. See doc/README.sqlite for details. * Mark BerkeleyDB 4.8.26 and 5.0.21 supported. * Make t.maint more robust; ignore .ENCODING token. To fix test failures on, for instance, FreeBSD with unicode enabled. * Fix several compiler warnings "array subscript has type 'char'", by casting the arguments to unsigned char. * Split error messages for ENOENT and EINVAL into new function. * Avoid divison by zero in robx computation by checking if there are at least one ham message and one spam message registered. * contrib/spamitarium.pl updated to version 0.4.0 * Updated and integrated Ted Phelps's "Patch to prevent .ENCODING from being discarded by bogoutil -m" (SourceForge Patch #1743984). - remove call to suse_update_config (very old work around) - Remove redundant tags/sections from specfile - Use %_smp_mflags for parallel build
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4/standard/i586/patchinfo.28:
zypper in -t patch 2012-21
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4/standard/i586/patchinfo.28 (i586 x86_64):
bogofilter-1.2.3-12.1 bogofilter-debuginfo-1.2.3-12.1 bogofilter-debugsource-1.2.3-12.1
References:
http://support.novell.com/security/cve/CVE-2010-2494.html https://bugzilla.novell.com/792939
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|