Buscar

Este contenido no está disponible en el idioma seleccionado.

1.160. spamassassin

download PDF

1.160.1. RHBA-2011:1035: spamassassin bug fix and enhancement update

An updated spamassassin package that fixes various bugs and adds an enhancement is now available for Red Hat Enterprise Linux 5.
SpamAssassin provides a way to filter unsolicited email (spam messages) from incoming email.
The spamassassin package has been upgraded to the upstream version 3.3.1, which includes the default upstream rules and provides a number of bug fixes over the previous version. In order to keep the rules up-to-date, it is strongly recommended to allow the nightly rules update. This can be done by removing the comment sign from the following line in the /etc/cron.d/sa-update file:
#10 4 * * * root /usr/share/spamassassin/sa-update.cron 2>&1 | tee -a /var/log/sa-update.log
The regular update of the upstream rules ensures the SpamAssassin's best functionality. (BZ#481616)
In addition, this updated package fixes the following bug:
* Due to an incorrect "FH_DATE_PAST_20XX" filter rule, many emails containing the date 2010 in the message header were wrongly regarded as spam. According to the rule, all email messages containing the date between 2010 and 2099 had the spam score increased. To fix this problem, the rule "FH_DATE_PAST_20XX" has been modified to reflect the current year. (BZ#552127)
All users of spamassassin are advised to upgrade to this updated package, which resolves this issue and adds this enhancement.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.