Package: claws-mail / 3.11.1-3+deb8u1

Metadata

Package Version Patches format
claws-mail 3.11.1-3+deb8u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
11mark_trashed_as_read.patch | (download)

/src/summaryview.c | 4 4 + 0 - 0 !
1 file changed, 4 insertions(+)

 feature patch to mark as read mails moved to trash
12fix_manpage_header.patch | (download)

/doc/man/claws-mail.1 | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 set command instead project as name in manpage
13desktop_file_categories.patch | (download)

claws-mail.desktop | 3 2 + 1 - 0 !
1 file changed, 2 insertions(+), 1 deletion(-)

 fix validation errors in desktop file (v2)
14CVE_2010_5109.patch | (download)

src/plugins/tnef_parse/ytnef.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 patch to fix possible buffer overflow
 in TNEF parser's embedded copy of ytnef library.
 Originally CVE-2010-5109 in libytnef.
15fix_crash_open_folder.patch | (download)

src/addr_compl.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 be sure strlen is not given a null name
CVE 2015 8614 1.patch | (download)

src/codeconv.c | 12 6 + 6 - 0 !
1 file changed, 6 insertions(+), 6 deletions(-)

 make sure we don't run out of the output buffer. maybe fixes bug #3557
Bug: http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
CVE 2015 8614 2.patch | (download)

src/codeconv.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 fix bug 3584, 'after 3.13.1, characters in some japanese codec are never correctly converted to internal ones'
Bug: http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3584
CVE 2015 8708.patch | (download)

src/codeconv.c | 17 15 + 2 - 0 !
1 file changed, 15 insertions(+), 2 deletions(-)

 adjust and comment range checks in jp text conversions
Bug: http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557

Two of the conversion functions may need more than 3 bytes to convert
the last character, so a limited buffer overrun is still possible.

Bug #3557 / CVE-2015-8708