Bug 158693 (spamassassin_RHEL4)

Summary: spamassassin RHEL4 Tracker
Product: Red Hat Enterprise Linux 4 Reporter: Warren Togami <wtogami>
Component: spamassassinAssignee: Warren Togami <wtogami>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: dff
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: spamassassin-3.0.4-1.el4 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-07-04 02:23:03 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 147464, 155423, 156390, 159198    
Bug Blocks:    

Description Warren Togami 2005-05-24 21:31:55 UTC
This tracks issues solved by the proposed spamassassin-3.0.x for RHEL4U.

Comment 1 Warren Togami 2005-05-24 21:48:25 UTC
http://wiki.apache.org/spamassassin/changes302
http://wiki.apache.org/spamassassin/changes303
All changes in the 3.0.x branch are double-reviewed upstream and limited to bug
fixes.  Zero risk and well tested while maintaining ABI with 3rd party plugins.

Bug #156390 prevents OOM conditions which can DoS the entire machine.

Comment 7 Warren Togami 2005-07-04 02:23:03 UTC
Fixed in RHSA-2005:498 spamassassin-3.0.4-1.el4