|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2016-0067|
|Summary:||Mageia Linux Local Security Checks mgasa-2016-0067|
Mageia Linux Local Security Checks mgasa-2016-0067
Updated claws-mail fix security vulnerabilities A stack-based buffer overflow has been found in conv_euctojis() after applying incomplete patch for CVE-2015-8614. In conv_euctojis() the comparison is with outlen - 3, but each pass through the loop uses up to 5 bytes and the rest of the function may add another 4 bytes. The comparison should presumably be '
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2015-8708|
|Copyright||Copyright (C) 2016 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.