| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: perl-Mail-SpamAssassin-Plugin-iXhash2 | Distribution: SUSE Linux Enterprise 15 |
| Version: 2.05 | Vendor: SUSE LLC <https://www.suse.com/> |
| Release: 150600.23.4 | Build date: Fri May 10 10:46:33 2024 |
| Group: Development/Libraries/Perl | Build host: s390zp35 |
| Size: 23850 | Source RPM: spamassassin-3.4.5-150600.23.4.src.rpm |
| Packager: https://www.suse.com/ | |
| Url: http://spamassassin.org/ | |
| Summary: The iXhash plugin for SpamAssassin | |
This archive contains the iXhash2 plugin for the SpamAssassin spam filtering software, along with an example config file. Basically the plugin provides a network-based test just as razor2, pyzor and DCC do. Working solely on the body of an email, it removes parts of it and computes a hash value from the rest. These values will then be looked up via DNS using the domains given in the config file(s). You need Net::DNS and Digest::MD5 installed
Apache-2.0
* Thu Apr 22 2021 varkoly@suse.com
- Deprecated path "/var/run/" used in systemd-services (bsc#1185184)
* Tue Apr 06 2021 varkoly@suse.com
- Update to version 3.4.5
o CVE-2020-1946: spamassassin: security update (bsc#1184221)
o CVE-2019-12420: spamassassin: memory leak via crafted messages
(bsc#1159133)
- Remove patches applied by the update:
CVE-2020-1930.diff
CVE-2020-1931.diff
CVE-Level-issue-with-Rule-Files.patch
* Tue Mar 24 2020 varkoly@suse.com
- CVE-2020-1930: Nefarious rule configuration (.cf) files can be
configured to run system commands (bsc#1162197)
- CVE-2020-1931: Nefarious rule configuration (.cf) files can be
configured to run system commands with warnings (bsc#1162200)
Apply upstream patches:
CVE-2020-1930.diff
CVE-2020-1931.diff
* Wed Jul 24 2019 varkoly@suse.com
- CVE-2018-11805: spamassassin: CVE Level issue with Rule Files
(bsc#1118987)
- spamassassin 3.3.2 and Perl 5.18.0: Altering hash requires
restarting loop else UNDEFINED behavior.
(bsc#862963)
- Added Upstream patches
CVE-Level-issue-with-Rule-Files.patch
Altering-hash-requires-restarting-loop.patch
* Wed Jan 16 2019 jengelh@inai.de
- Reduce boilerplate generated by %service_*.
* Wed Jan 16 2019 varkoly@suse.com
- bsc#1115411 spamassassin: migrate from cron to systemd timers
- Apply %license macro
* Tue Sep 18 2018 suse+build@de-korte.org
- update spamassassin to 3.4.2
* There are four new plugins (disabled by default)
HashBL - interface to The Email Blocklist (EBL)
ResourceLimits - assure your spamd child processes do not exceed
specified CPU or memory limit
FromNameSpoof - detection of the From:name field being used to
mislead
Phishing - finds uris used in phishing campaigns detected by
OpenPhish (https://openphish.com) or PhishTank
(https://phishtank.com) feeds
* For security reasons SSLv3 support has been removed from spamc(1).
* Four CVE security bug fixes are included in this release for
PDFInfo.pm and the SA core: CVE-2017-15705, CVE-2016-1238,
CVE-2018-11780 & CVE-2018-11781.
* In sa-update script, optional support for SHA-256 / SHA-512 in
addition to or instead of SHA1 has been added for better validation
of rules.
* GeoIP2 support has been added to RelayCountry and URILocalBL plugins
due to GeoIP legacy API deprecations.
* several new or enhanced configuration options
- update spampd to 2.51
* Replace IO::Socket::INET with IO::Socket::IP for IPv6 support
* Unix ports (ability to listen on UNIX sockets)
* Add X-Envelope-* headers before Received
* Add /usr/local/bin and /usr/local/sbin to PATH
* Add --setsid option to start server with setsid if running in
background
- Removed patches (are now in upstream):
* 0001-bug-7361-Allow-building-against-OpenSSL-1.1.0.patch
* 0001-Fix-bug-7367-Don-t-assume-cwd-.-is-in-INC-it-may-be-.patch
* DNS-resolver-recursion-desired-not-set.patch
* spamassassin-dont_use_SSLv3_methods.patch
* spampd-2.42_git_20170226.patch
* Unescaped_left_brace_in_regex_is_deprecated.patch
* Mon Sep 17 2018 suse+build@de-korte.org
- Revert incompatibility-with-NET-DNS.patch (this patch attempts to
fix a problem that was already solved by bsc#1059210)
* Thu Sep 13 2018 varkoly@suse.com
- bsc#1107765 - spamassassin: incompatibility with Net::DNS >= 1.01
- Add upstream patch:
incompatibility-with-NET-DNS.patch
* Sun Sep 09 2018 varkoly@suse.com
- bsc#1069831 Running sa-update from spamassassin gives warning
about deprecated regex
o remove deprecated-regex.patch and apply upstream patch:
Unescaped_left_brace_in_regex_is_deprecated.patch
This patch also fixes the bug PerMsgStatus Warning
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7196
* Mon Feb 19 2018 varkoly@suse.com
- bsc#1069831 Running sa-update from spamassassin gives warning about deprecated regex
o add deprecated-regex.patch
* Thu Jan 18 2018 varkoly@suse.com
- bsc#1059210 spamassassin perl dns resolver recursion desired not set
o add DNS-resolver-recursion-desired-not-set.patch
* Mon Dec 11 2017 jengelh@inai.de
- Replace %__-type macro indirections.
Replace old $RPM_ shell variables.
* Thu Nov 23 2017 rbrown@suse.com
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)
* Tue Nov 21 2017 mpluskal@suse.com
- Update umask in cronjob (boo#861539)
- Make sure that spamd can start (boo#961291)
* Wed Aug 30 2017 vcizek@suse.com
- Add support for building with OpenSSL 1.1 (bsc#1055252)
* add 0001-bug-7361-Allow-building-against-OpenSSL-1.1.0.patch
* add spamassassin-dont_use_SSLv3_methods.patch
- Fix build with Perl 5.26
* https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7367
* add 0001-Fix-bug-7367-Don-t-assume-cwd-.-is-in-INC-it-may-be-.patch
* Sun Feb 26 2017 opensuse@dstoecker.de
- SPAMPD: add spampd-2.42_git_20170226.patch - support IPv6 with IO::Socket::IP
- Drop old init system support (systems before 12.x)
* Mon Feb 20 2017 kukuk@suse.de
- Don't call/require insserv if we use systemd
* Tue Jan 12 2016 bwiedemann@suse.com
- use service command to restart spamd and amavis (boo#961279)
* Sun Nov 29 2015 opensuse@dstoecker.de
- change default spampd settings to properly support IPv6 and allow larger SPAM
* Wed Aug 26 2015 hsk@imb-jena.de
- disable again "make test" (seems not to like being run offline)
* Thu Jul 09 2015 hsk@imb-jena.de
- update to 3.4.1
* new plugins (disabled by default)
TxRep -substantially improved replacement of AWL plugin
PDFInfo - help detecting spam with attached PDF files
URILocalBL - new rule test types for URIs in html message parts
* several new or enhanced configuration options, e.g.:
normalize_charset - reimplemented, see Mail::SpamAssassin::Conf
bayes_token_sources - more control on sources of tokens for Bayes plugin
* internal change, probably only affecting 3rd party plugins:
Util::RegistrarBoundaries is being replaced by RegistryBoundaries
* rule updates, improvements, optimizations, bug fixes
- patch-utf8 removed, cf. bz.apache.org/SpamAssassin/show_bug.cgi?id=7133
- re-enable "make test" for 13.2 and up
* Mon Feb 02 2015 mpluskal@suse.com
- Enable reload in unit files (boo#915736)
* Tue Jan 06 2015 mpluskal@suse.com
- Fix for boo#911355
- Don't install init files when service files are installed
- Create symlinks for rcspamd and rcspampd when systemd is used
- Remove unnecessary cleanup section from spec files
/etc/mail/spamassassin/iXhash2.cf /usr/lib/perl5/vendor_perl/5.26.1/Mail/SpamAssassin/Plugin/iXhash2.pm /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2 /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/CHANGELOG /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/LICENSE /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/README
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Aug 9 16:11:13 2025