Package: spamassassin Version: 3.4.1-3 Severity: important Tags: upstream spamassassin seems to be affected by upstream bug 7223
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7223 Most DNS queries (e.g. RBL) has been failing before applying 2 lines patch available upstream. -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 4.4.0-1-686-pae (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages spamassassin depends on: ii adduser 3.114 ii curl 7.47.0-1 ii init-system-helpers 1.29 ii libhtml-parser-perl 3.72-1 ii libhttp-date-perl 6.02-1 ii libnet-dns-perl 1.05-1 ii libnetaddr-ip-perl 4.078+dfsg-1+b1 ii libsocket6-perl 0.25-1+b2 ii libsys-hostname-long-perl 1.5-1 ii libwww-perl 6.15-1 ii perl 5.22.1-9 ii perl-modules-5.22 [libarchive-tar-perl] 5.22.1-9 ii w3m 0.5.3-27 Versions of packages spamassassin recommends: ii gnupg 1.4.20-5 ii libio-socket-inet6-perl 2.72-2 ii libmail-spf-perl 2.9.0-4 ii libperl5.22 [libsys-syslog-perl] 5.22.1-9 ii sa-compile 3.4.1-3 ii spamc 3.4.1-3 Versions of packages spamassassin suggests: ii libdbi-perl 1.634-1+b1 ii libencode-detect-perl 1.01-4+b2 ii libio-compress-perl [libcompress-zlib-perl] 2.069-1 ii libio-socket-ssl-perl 2.025-1 ii libmail-dkim-perl 0.40-1 ii libperl5.22 [libcompress-zlib-perl] 5.22.1-9 ii pyzor 1:0.5.0-4 ii razor 1:2.85-4.2+b1 -- Configuration Files: /etc/spamassassin/init.pre changed [not included] /etc/spamassassin/v310.pre changed [not included] /etc/spamassassin/v320.pre changed [not included] /etc/spamassassin/v341.pre changed [not included] -- no debconf information

