Your message dated Tue, 11 Dec 2007 08:47:10 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#455432: fixed in emacs22 22.1+1-2.2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: emacs22
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for emacs22.
CVE-2007-6109[0]:
| Buffer overflow in emacs allows attackers to have an unknown impact,
| as demonstrated via a vector involving the command line.
You can find the upstream patch for this on:
http://cvs.savannah.gnu.org/viewvc/emacs/emacs/src/editfns.c?r1=1.439.2.3&r2=1.439.2.8
If you fix this vulnerability please also include the CVE id
in your changelog entry.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpjWne9D1w9f.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: emacs22
Source-Version: 22.1+1-2.2
We believe that the bug you reported is fixed in the latest version of
emacs22, which is due to be installed in the Debian FTP archive:
emacs22-bin-common_22.1+1-2.2_i386.deb
to pool/main/e/emacs22/emacs22-bin-common_22.1+1-2.2_i386.deb
emacs22-common_22.1+1-2.2_all.deb
to pool/main/e/emacs22/emacs22-common_22.1+1-2.2_all.deb
emacs22-el_22.1+1-2.2_all.deb
to pool/main/e/emacs22/emacs22-el_22.1+1-2.2_all.deb
emacs22-gtk_22.1+1-2.2_i386.deb
to pool/main/e/emacs22/emacs22-gtk_22.1+1-2.2_i386.deb
emacs22-nox_22.1+1-2.2_i386.deb
to pool/main/e/emacs22/emacs22-nox_22.1+1-2.2_i386.deb
emacs22_22.1+1-2.2.diff.gz
to pool/main/e/emacs22/emacs22_22.1+1-2.2.diff.gz
emacs22_22.1+1-2.2.dsc
to pool/main/e/emacs22/emacs22_22.1+1-2.2.dsc
emacs22_22.1+1-2.2_i386.deb
to pool/main/e/emacs22/emacs22_22.1+1-2.2_i386.deb
emacs_22.1+1-2.2_all.deb
to pool/main/e/emacs22/emacs_22.1+1-2.2_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated emacs22 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 10 Dec 2007 16:42:03 +0100
Source: emacs22
Binary: emacs22-el emacs22-gtk emacs22-bin-common emacs22-nox emacs22
emacs22-common emacs
Architecture: source all i386
Version: 22.1+1-2.2
Distribution: unstable
Urgency: high
Maintainer: Rob Browning <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description:
emacs - The GNU Emacs editor (metapackage)
emacs22 - The GNU Emacs editor
emacs22-bin-common - The GNU Emacs editor's shared, architecture dependent
files
emacs22-common - The GNU Emacs editor's shared, architecture independent
infrastru
emacs22-el - GNU Emacs LISP (.el) files
emacs22-gtk - The GNU Emacs editor (with GTK user interface)
emacs22-nox - The GNU Emacs editor (without X support)
Closes: 455432
Changes:
emacs22 (22.1+1-2.2) unstable; urgency=high
.
* Non-maintainer upload by testing-security team.
* This update addresses the following security issue:
- CVE-2007-6109: A stack-based buffer overflow in the format function
when dealing with high precision values could lead to arbitrary code
execution.
Added upstream patch (CVE-2007-6109.diff) to fix this (Closes: #455432).
Files:
9d1597c6705524cc8e86937588966230 937 editors optional emacs22_22.1+1-2.2.dsc
975c9affc8edc1e692cd3facf53d6465 50897 editors optional
emacs22_22.1+1-2.2.diff.gz
ea3f82568947e9111c84ffe16615011e 18622 editors optional
emacs_22.1+1-2.2_all.deb
fa0d0e48585203b298a699b74b7e93c3 14345912 editors optional
emacs22-common_22.1+1-2.2_all.deb
21ced7224064a325d5327c99a7b3cf21 11186436 editors optional
emacs22-el_22.1+1-2.2_all.deb
c8b05bba9e837992deb881f9d83009c6 2567120 editors optional
emacs22_22.1+1-2.2_i386.deb
d0b8715e9a832bd2dc91b7db9b14da0e 2317862 editors optional
emacs22-nox_22.1+1-2.2_i386.deb
0fbccd8a1ca24c4217a809143af8e056 2562146 editors optional
emacs22-gtk_22.1+1-2.2_i386.deb
c1a6eb021c00576f15b3f6b595724646 162358 editors optional
emacs22-bin-common_22.1+1-2.2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHXkSxHYflSXNkfP8RAu6DAJ9td8SSQiGHvo8yb3T21yIJgJiJewCfQ6/o
jR9XN/JFTj/WOY13Uag7X8M=
=B7DN
-----END PGP SIGNATURE-----
--- End Message ---