Amazon Linux 1 Security Advisory: ALAS-2018-1091
Advisory Release Date: 2018-10-17 21:58 Pacific
Advisory Updated Date: 2018-10-18 22:19 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in the way a local user on the SpamAssassin server could inject code in the meta rule syntax. This could cause the arbitrary code execution on the server when these rules are being processed.(CVE-2018-11781)
A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.(CVE-2018-11780)
A flaw was found in the way SpamAssassin processes HTML email containing unclosed HTML tags. A carefully crafted mail message could cause SpamAssassin to consume significant resources. If a large number of these messages are sent, a denial of service could occur potentially delaying or preventing the delivery of email.(CVE-2017-15705)
Affected Packages:
spamassassin
Issue Correction:
Run yum update spamassassin to update your system.
i686:
spamassassin-debuginfo-3.4.2-2.14.amzn1.i686
spamassassin-3.4.2-2.14.amzn1.i686
src:
spamassassin-3.4.2-2.14.amzn1.src
x86_64:
spamassassin-debuginfo-3.4.2-2.14.amzn1.x86_64
spamassassin-3.4.2-2.14.amzn1.x86_64