Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: perl-Mail-SpamAssassin-Plugin-iXhash2 | Distribution: SUSE Linux Enterprise 15 |
Version: 2.05 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 12.13.1 | Build date: Tue Apr 27 15:04:24 2021 |
Group: Development/Libraries/Perl | Build host: ibs-arm-1 |
Size: 23850 | Source RPM: spamassassin-3.4.5-12.13.1.src.rpm |
Packager: https://www.suse.com/ | |
Url: http://spamassassin.org/ | |
Summary: The iXhash plugin for SpamAssassin |
This archive contains the iXhash2 plugin for the SpamAssassin spam filtering software, along with an example config file. Basically the plugin provides a network-based test just as razor2, pyzor and DCC do. Working solely on the body of an email, it removes parts of it and computes a hash value from the rest. These values will then be looked up via DNS using the domains given in the config file(s). You need Net::DNS and Digest::MD5 installed
Apache-2.0
* Thu Apr 22 2021 varkoly@suse.com - Deprecated path "/var/run/" used in systemd-services (bsc#1185184) * Tue Apr 06 2021 varkoly@suse.com - Update to version 3.4.5 o CVE-2020-1946: spamassassin: security update (bsc#1184221) o CVE-2019-12420: spamassassin: memory leak via crafted messages (bsc#1159133) - Remove patches applied by the update: CVE-2020-1930.diff CVE-2020-1931.diff CVE-Level-issue-with-Rule-Files.patch * Tue Mar 24 2020 varkoly@suse.com - CVE-2020-1930: Nefarious rule configuration (.cf) files can be configured to run system commands (bsc#1162197) - CVE-2020-1931: Nefarious rule configuration (.cf) files can be configured to run system commands with warnings (bsc#1162200) Apply upstream patches: CVE-2020-1930.diff CVE-2020-1931.diff * Wed Jul 24 2019 varkoly@suse.com - CVE-2018-11805: spamassassin: CVE Level issue with Rule Files (bsc#1118987) - spamassassin 3.3.2 and Perl 5.18.0: Altering hash requires restarting loop else UNDEFINED behavior. (bsc#862963) - Added Upstream patches CVE-Level-issue-with-Rule-Files.patch Altering-hash-requires-restarting-loop.patch * Wed Jan 16 2019 jengelh@inai.de - Reduce boilerplate generated by %service_*. * Wed Jan 16 2019 varkoly@suse.com - bsc#1115411 spamassassin: migrate from cron to systemd timers - Apply %license macro * Tue Sep 18 2018 suse+build@de-korte.org - update spamassassin to 3.4.2 * There are four new plugins (disabled by default) HashBL - interface to The Email Blocklist (EBL) ResourceLimits - assure your spamd child processes do not exceed specified CPU or memory limit FromNameSpoof - detection of the From:name field being used to mislead Phishing - finds uris used in phishing campaigns detected by OpenPhish (https://openphish.com) or PhishTank (https://phishtank.com) feeds * For security reasons SSLv3 support has been removed from spamc(1). * Four CVE security bug fixes are included in this release for PDFInfo.pm and the SA core: CVE-2017-15705, CVE-2016-1238, CVE-2018-11780 & CVE-2018-11781. * In sa-update script, optional support for SHA-256 / SHA-512 in addition to or instead of SHA1 has been added for better validation of rules. * GeoIP2 support has been added to RelayCountry and URILocalBL plugins due to GeoIP legacy API deprecations. * several new or enhanced configuration options - update spampd to 2.51 * Replace IO::Socket::INET with IO::Socket::IP for IPv6 support * Unix ports (ability to listen on UNIX sockets) * Add X-Envelope-* headers before Received * Add /usr/local/bin and /usr/local/sbin to PATH * Add --setsid option to start server with setsid if running in background - Removed patches (are now in upstream): * 0001-bug-7361-Allow-building-against-OpenSSL-1.1.0.patch * 0001-Fix-bug-7367-Don-t-assume-cwd-.-is-in-INC-it-may-be-.patch * DNS-resolver-recursion-desired-not-set.patch * spamassassin-dont_use_SSLv3_methods.patch * spampd-2.42_git_20170226.patch * Unescaped_left_brace_in_regex_is_deprecated.patch * Mon Sep 17 2018 suse+build@de-korte.org - Revert incompatibility-with-NET-DNS.patch (this patch attempts to fix a problem that was already solved by bsc#1059210) * Thu Sep 13 2018 varkoly@suse.com - bsc#1107765 - spamassassin: incompatibility with Net::DNS >= 1.01 - Add upstream patch: incompatibility-with-NET-DNS.patch * Sun Sep 09 2018 varkoly@suse.com - bsc#1069831 Running sa-update from spamassassin gives warning about deprecated regex o remove deprecated-regex.patch and apply upstream patch: Unescaped_left_brace_in_regex_is_deprecated.patch This patch also fixes the bug PerMsgStatus Warning https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7196 * Mon Feb 19 2018 varkoly@suse.com - bsc#1069831 Running sa-update from spamassassin gives warning about deprecated regex o add deprecated-regex.patch * Thu Jan 18 2018 varkoly@suse.com - bsc#1059210 spamassassin perl dns resolver recursion desired not set o add DNS-resolver-recursion-desired-not-set.patch * Mon Dec 11 2017 jengelh@inai.de - Replace %__-type macro indirections. Replace old $RPM_ shell variables. * Thu Nov 23 2017 rbrown@suse.com - Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468) * Tue Nov 21 2017 mpluskal@suse.com - Update umask in cronjob (boo#861539) - Make sure that spamd can start (boo#961291) * Wed Aug 30 2017 vcizek@suse.com - Add support for building with OpenSSL 1.1 (bsc#1055252) * add 0001-bug-7361-Allow-building-against-OpenSSL-1.1.0.patch * add spamassassin-dont_use_SSLv3_methods.patch - Fix build with Perl 5.26 * https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7367 * add 0001-Fix-bug-7367-Don-t-assume-cwd-.-is-in-INC-it-may-be-.patch * Sun Feb 26 2017 opensuse@dstoecker.de - SPAMPD: add spampd-2.42_git_20170226.patch - support IPv6 with IO::Socket::IP - Drop old init system support (systems before 12.x) * Mon Feb 20 2017 kukuk@suse.de - Don't call/require insserv if we use systemd * Tue Jan 12 2016 bwiedemann@suse.com - use service command to restart spamd and amavis (boo#961279) * Sun Nov 29 2015 opensuse@dstoecker.de - change default spampd settings to properly support IPv6 and allow larger SPAM * Wed Aug 26 2015 hsk@imb-jena.de - disable again "make test" (seems not to like being run offline) * Thu Jul 09 2015 hsk@imb-jena.de - update to 3.4.1 * new plugins (disabled by default) TxRep -substantially improved replacement of AWL plugin PDFInfo - help detecting spam with attached PDF files URILocalBL - new rule test types for URIs in html message parts * several new or enhanced configuration options, e.g.: normalize_charset - reimplemented, see Mail::SpamAssassin::Conf bayes_token_sources - more control on sources of tokens for Bayes plugin * internal change, probably only affecting 3rd party plugins: Util::RegistrarBoundaries is being replaced by RegistryBoundaries * rule updates, improvements, optimizations, bug fixes - patch-utf8 removed, cf. bz.apache.org/SpamAssassin/show_bug.cgi?id=7133 - re-enable "make test" for 13.2 and up * Mon Feb 02 2015 mpluskal@suse.com - Enable reload in unit files (boo#915736) * Tue Jan 06 2015 mpluskal@suse.com - Fix for boo#911355 - Don't install init files when service files are installed - Create symlinks for rcspamd and rcspampd when systemd is used - Remove unnecessary cleanup section from spec files
/etc/mail/spamassassin/iXhash2.cf /usr/lib/perl5/vendor_perl/5.26.1/Mail/SpamAssassin/Plugin/iXhash2.pm /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2 /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/CHANGELOG /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/LICENSE /usr/share/doc/packages/perl-Mail-SpamAssassin-Plugin-iXhash2/README
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 18:17:49 2024