Security update for spamassassin

This update for spamassassin to version 3.4.2 fixes the following issues:

Security issues fixed:

- CVE-2018-11781: Fixed an issue where a local user could inject code in the meta rule syntax (bsc#1108748).
- CVE-2018-11780: Fixed a potential remote code execution vulnerability in the PDFInfo plugin (bsc#1108750).
- CVE-2017-15705: Fixed a denial of service through unclosed tags in crafted emails (bsc#1108745).
- CVE-2016-1238: Fixed an issue where perl would load modules from the current directory (bsc#1108749).

Non-security issues fixed:

- Use systemd timers instead of cron (bsc#1115411)
- Fixed incompatibility with Net::DNS >= 1.01 (bsc#1107765)
- Fixed warning about deprecated regex during sa-update (bsc#1069831)

This update was imported from the SUSE:SLE-15:Update update project.

Fixed bugs
bnc#1107765
spamassassin: incompatibility with Net::DNS >= 1.01
bnc#1115411
spamassassin: migrate from cron to systemd timers
bnc#1069831
Running sa-update from spamassassin gives warning about deprecated regex
bnc#1108748
VUL-0: CVE-2018-11781: spamassassin: Local user code injection in the meta rule syntax
bnc#1108750
VUL-0: CVE-2018-11780: spamassassin: Potential remote code execution vulnerability in PDFInfo plugin
bnc#1108745
VUL-0: CVE-2017-15705 spamassassin: Certain unclosed tags in crafted emails allow for scan timeouts and resulting denial of service
bnc#1108749
VUL-0: CVE-2016-1238: spamassassin: loading modules from current directory
Selected Binaries
openSUSE Build Service is sponsored by