Stack-based buffer overflow vulnerabilities were found in conv_jistoeuc, conv_euctojis, conv_sjistoeuc functions, caused by missing bound checking on the output buffer, which is created on the stack with alloca().
Created claws-mail tracking bugs for this issue:
Affects: fedora-all [bug 1293580]
Affects: epel-all [bug 1293581]
> Upstream patch:
Dubious. The change to conv_jistoeuc() disables the loop, because (out-outbuf) will be zero and hence the while-condition will never be true.
Apart from that, the patch is part of 3.13.1 which is pending on its way into updates-testing already.
claws-mail-3.13.1-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
claws-mail-3.13.1-4.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.