Dan Harkless wrote:

> >                 RUS-CERT Advisory 200004-01: GNU Emacs 20
>
> As an XEmacs user, I would have liked to have seen one of the following
> statements:
>
> * These vulnerabilities only apply to GNU Emacs, not XEmacs.
>
> * We do not know if these vulnerabilities also apply to XEmacs.
>
> * These vulnerabilities apply to equally to GNU Emacs and XEmacs.

I guess that it would be option 2.

>    On the systems listed above, when a new subprocess is created
>    using the builtin Lisp function start-process, Emacs doesn't set
>    proper permissions for the slave PTY device.

On XEmacs, start-process only uses a pty if process-connection-type is
"t", otherwise it uses (unnamed) pipes.

> 2. Unsafe creation of temporary files
>
>   2.1. Scope
>
>    All Unix-like Emacs platforms on which public directories are
>    used to store temporary files.

Recent versions of XEmacs honour $TMPDIR, so there shouldn't be any
need to use public directories.

>   3.3. Problem
>
>    Functions like read-passwd do not clear the the history of
>    recently typed keys. In fact, there is no way to do that from
>    Emacs Lisp.

Ditto for XEmacs.

--
Glynn Clements <[EMAIL PROTECTED]>

Reply via email to