| Summary: | warn: plugin: eval failed: Insecure dependency in sprintf while running with -T switch at /usr/share/perl5/vendor_perl/Mail/SpamAssassin/Logger.pm line 241. | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Brian J. Murrell <brian> |
| Component: | spamassassin | Assignee: | Ondřej Lysoněk <olysonek> |
| Status: | CLOSED WONTFIX | QA Contact: | qe-baseos-daemons |
| Severity: | urgent | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.2 | CC: | ajb, amahdal, phil, psklenar, thozza, toracat |
| Target Milestone: | rc | Keywords: | Patch, Upstream |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-12-06 16:06:25 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | |||
| Bug Blocks: | 1534569 | ||
|
Description
Brian J. Murrell
2016-09-28 11:49:25 UTC
Can you verify that the problem gets fixed by applying the above mentioned patch for you? I set up a Copr repo (epel7) with spamassassin with this patch: https://copr.fedorainfracloud.org/coprs/jjelen/spamasassin-epel7/ Yes, I already patched my local installation here with that and it's working fine. I'm seeing the same issue on RHEL7.3 rpm -q spamassassin spamassassin-3.4.0-2.el7.x86_64 Any idea when this might get fixed? I have applied the above patch locally and can confirm it has fixed the issue for me. Simple reproducer: [root@localhost]# yum install -y spamassassin [root@localhost]# cat gen.sh #!/bin/bash test -d spam || mkdir spam ham for i in $(seq $1 $2); do cat << EOF > spam/$i Subject: foo $i bar EOF cat << EOF > ham/$i Subject: abc $i def EOF done [root@localhost]# bash gen.sh 1 200 [root@localhost]# sa-learn --spam spam Learned tokens from 200 message(s) (200 message(s) examined) [root@localhost]# sa-learn --ham ham Learned tokens from 200 message(s) (200 message(s) examined) [root@localhost]# cat mail Subject: foo bar [root@localhost]# cat mail | spamassassin -D 2>&1 | grep Insecure [root@localhost]# bash gen.sh 201 250 [root@localhost]# sa-learn --spam spam Learned tokens from 50 message(s) (250 message(s) examined) [root@localhost]# sa-learn --ham ham Learned tokens from 50 message(s) (250 message(s) examined) [root@localhost]# cat mail | spamassassin -D 2>&1 | grep Insecure říj 28 12:29:46.590 [12945] warn: plugin: eval failed: Insecure dependency in sprintf while running with -T switch at /usr/share/perl5/vendor_perl/Mail/SpamAssassin/Logger.pm line 241. říj 28 12:29:46.593 [12945] warn: plugin: eval failed: Insecure dependency in sprintf while running with -T switch at /usr/share/perl5/vendor_perl/Mail/SpamAssassin/Logger.pm line 241. Red Hat Enterprise Linux version 7 entered the Maintenance Support 1 Phase in August 2019. In this phase only qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. Other errata advisories may be delivered as appropriate. This bug has been reviewed by Support and Engineering representative and does not meet the inclusion criteria for Maintenance Support 1 Phase. If this issue still exists in newer major version of Red Hat Enterprise Linux, it has been cloned there and work will continue in the cloned bug. For more information about Red Hat Enterprise Linux Lifecycle, please see https://access.redhat.com/support/policy/updates/errata/ Development Management has reviewed and declined this request. You may appeal this decision by using your Red Hat support channels, who will make certain the issue receives the proper prioritization with product and development management. https://www.redhat.com/support/process/production/#howto |