Bug 17380 - claws-mail new security issue fixed upstream in 3.13.1 (CVE-2015-8614)
Summary: claws-mail new security issue fixed upstream in 3.13.1 (CVE-2015-8614)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/669041/
Whiteboard: MGA5-64-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-12-21 21:49 CET by David Walser
Modified: 2016-01-12 10:14 CET (History)
5 users (show)

See Also:
Source RPM: claws-mail-3.11.1-2.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-12-21 21:49:56 CET
A security issue was fixed in claws-mail 3.13.1:
http://openwall.com/lists/oss-security/2015/12/21/10

Links to more information and fixes are in the message above.

Reproducible: 

Steps to Reproduce:
David Walser 2015-12-21 21:50:04 CET

CC: (none) => jani.valimaa

Comment 1 David Walser 2015-12-22 17:07:16 CET
CVE-2015-8614 has been assigned:
http://openwall.com/lists/oss-security/2015/12/22/2

Summary: claws-mail new security issue fixed upstream in 3.13.1 => claws-mail new security issue fixed upstream in 3.13.1 (CVE-2015-8614)

Comment 2 Julien Moragny 2015-12-22 22:11:43 CET
Hi,

I don't have access to my computer til next week. I'll look at it when I get back

Regzrds 
Julien
David Walser 2015-12-23 21:58:28 CET

URL: (none) => http://lwn.net/Vulnerabilities/669041/

Comment 3 David Walser 2015-12-31 19:56:04 CET
Note that an additional commit from upstream is needed:
http://openwall.com/lists/oss-security/2015/12/31/1

It is linked at the bottom of the message above.

That commit should also be added in Cauldron, in which it fixes CVE-2015-8708 (for the incomplete fix for CVE-2015-8614).  That additional CVE isn't relevant for Mageia 5, since we haven't fixed this yet.
Comment 4 David Walser 2015-12-31 20:03:52 CET
Fedora has issued an advisory for this on December 30:
https://lists.fedoraproject.org/pipermail/package-announce/2015-December/174741.html
Comment 5 Jani Välimaa 2016-01-01 09:52:09 CET
Patch for CVE-2015-8708 added to Cauldron's claws-mail.
Comment 6 Jani Välimaa 2016-01-01 10:08:10 CET
About mga5, should we bump 3.11.1 -> 3.13.1 with CVE-2015-8708 fix?
Comment 7 Jani Välimaa 2016-01-01 10:46:50 CET
Update to 3.13.1 is a bit problematical as claws-mail-gdata-plugin requires newer libgdata than is available in mga5 (0.16.1 available and >= 0.17.1 required). New libgdata would mean new libmajor -> rebuilds.
Comment 8 Julien Moragny 2016-01-01 12:18:10 CET
Hello all,

To begin with Happy New Year! 

And thanks for the update on the cauldron package.

I just pushed an update for mga5 in update_testing. Below is a proposition for the advisory :

========================

Updated claws-mail fix security vulnerabilities:

no bounds checking on the output buffer in conv_jistoeuc, conv_euctojis, conv_sjistoeuc

A Tails contributor found a vulnerability in claws-mail where in codeconv.c a function
for japanese character set conversion called conv_jistoeuc() has no bounds checking 
on the output buffer which is created on the stack with alloca() (CVE-2015-8614).


References:
http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
https://bugs.mageia.org/show_bug.cgi?id=17380
https://security-tracker.debian.org/tracker/CVE-2015-8614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8614
========================

Updated packages in core/updates_testing:
========================
claws-mail-3.11.1-3.mga5
claws-mail-tools-3.11.1-3.mga5
claws-mail-devel-3.11.1-3.mga5
claws-mail-plugins-3.11.1-3.mga5
claws-mail-archive-plugin-3.11.1-3.mga5
claws-mail-bogofilter-plugin-3.11.1-3.mga5
claws-mail-gdata-plugin-3.11.1-3.mga5
claws-mail-smime-plugin-3.11.1-3.mga5
claws-mail-pgpcore-plugin-3.11.1-3.mga5
claws-mail-pgpinline-plugin-3.11.1-3.mga5
claws-mail-pgpmime-plugin-3.11.1-3.mga5
claws-mail-spamassassin-plugin-3.11.1-3.mga5
claws-mail-acpi-plugin-3.11.1-3.mga5
claws-mail-att_remover-plugin-3.11.1-3.mga5
claws-mail-bsfilter-plugin-3.11.1-3.mga5
claws-mail-fancy-plugin-3.11.1-3.mga5
claws-mail-fetchinfo-plugin-3.11.1-3.mga5
claws-mail-mailmbox-plugin-3.11.1-3.mga5
claws-mail-newmail-plugin-3.11.1-3.mga5
claws-mail-notification-plugin-3.11.1-3.mga5
claws-mail-perl-plugin-3.11.1-3.mga5
claws-mail-python-plugin-3.11.1-3.mga5
claws-mail-rssyl-plugin-3.11.1-3.mga5
claws-mail-vcalendar-plugin-3.11.1-3.mga5
claws-mail-vcalendar-plugin-devel-3.11.1-3.mga5
claws-mail-attachwarner-plugin-3.11.1-3.mga5
claws-mail-spam_report-plugin-3.11.1-3.mga5
claws-mail-tnef_parse-plugin-3.11.1-3.mga5
claws-mail-address_keeper-plugin-3.11.1-3.mga5
claws-mail-clamd-plugin-3.11.1-3.mga5
claws-mail-pdf_viewer-plugin-3.11.1-3.mga5
claws-mail-libravatar-plugin-3.11.1-3.mga5
claws-mail-debuginfo-3.11.1-3.mga5


Source RPM:
claws-mail-3.11.1-3.mga5.src.rpm
Comment 9 David Walser 2016-01-01 13:03:30 CET
Thanks Julien and Jani!  Assigning to QA.

Advisory and package list in Comment 8.

CC: (none) => julien.moragny
Assignee: julien.moragny => qa-bugs

Comment 10 Julien Moragny 2016-01-01 18:49:01 CET
FWIW, the x86_64 packages install without pb and I don't see a difference with my usual usage.
Comment 11 Lewis Smith 2016-01-04 18:45:14 CET
Testing MGA5 x64, OK

Like Comment 10, I use Claws Mail routinely. Before the update I tried one of the POCs http://www.thewildbeast.co.uk/claws-mail/bugzilla/attachment.cgi?id=1602 in
bug http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3563
but it sent & received without error...

Updated to:
 claws-mail-3.11.1-3.mga5
 claws-mail-bogofilter-plugin-3.11.1-3.mga5
 claws-mail-fancy-plugin-3.11.1-3.mga5
 claws-mail-pgpcore-plugin-3.11.1-3.mga5
 claws-mail-pgpmime-plugin-3.11.1-3.mga5
and played with it a bit, including re-trying the POC. So with the confirmation above - OK.

CC: (none) => lewyssmith
Whiteboard: (none) => MGA5-64-OK

Dave Hodgins 2016-01-12 07:29:27 CET

Keywords: (none) => validated_update
Whiteboard: MGA5-64-OK => MGA5-64-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 12 Mageia Robot 2016-01-12 10:14:56 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0008.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.