Package: emacs22 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for emacs22.
CVE-2007-6109[0]: | Buffer overflow in emacs allows attackers to have an unknown impact, | as demonstrated via a vector involving the command line. You can find the upstream patch for this on: http://cvs.savannah.gnu.org/viewvc/emacs/emacs/src/editfns.c?r1=1.439.2.3&r2=1.439.2.8 If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpDMtjpq3JTd.pgp
Description: PGP signature