Stack-based buffer overflow vulnerabilities were found in conv_jistoeuc, conv_euctojis, conv_sjistoeuc functions, caused by missing bound checking on the output buffer, which is created on the stack with alloca(). Upstream patch: http://git.claws-mail.org/?p=claws.git;a=commit;h=d390fa07f5548f3173dd9cc13b233db5ce934c82 CVE assignment: http://seclists.org/oss-sec/2015/q4/557
Created claws-mail tracking bugs for this issue: Affects: fedora-all [bug 1293580] Affects: epel-all [bug 1293581]
> Upstream patch: Dubious. The change to conv_jistoeuc() disables the loop, because (out-outbuf) will be zero and hence the while-condition will never be true. Apart from that, the patch is part of 3.13.1 which is pending on its way into updates-testing already.
http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3584
http://git.claws-mail.org/?p=claws.git;a=commitdiff;h=e3ffcb455e0376053451ce968e6c71ef37708222
claws-mail-3.13.1-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
claws-mail-3.13.1-4.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.