Your message dated Tue, 11 Dec 2007 09:17:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#455433: fixed in emacs21 21.4a+1-5.1+lenny1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: emacs22
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for emacs22.

CVE-2007-6109[0]:
| Buffer overflow in emacs allows attackers to have an unknown impact,
| as demonstrated via a vector involving the command line.

You can find the upstream patch for this on:
http://cvs.savannah.gnu.org/viewvc/emacs/emacs/src/editfns.c?r1=1.439.2.3&r2=1.439.2.8

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpPoXaarQ4Ph.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: emacs21
Source-Version: 21.4a+1-5.1+lenny1

We believe that the bug you reported is fixed in the latest version of
emacs21, which is due to be installed in the Debian FTP archive:

emacs21-bin-common_21.4a+1-5.1+lenny1_i386.deb
  to pool/main/e/emacs21/emacs21-bin-common_21.4a+1-5.1+lenny1_i386.deb
emacs21-common_21.4a+1-5.1+lenny1_all.deb
  to pool/main/e/emacs21/emacs21-common_21.4a+1-5.1+lenny1_all.deb
emacs21-el_21.4a+1-5.1+lenny1_all.deb
  to pool/main/e/emacs21/emacs21-el_21.4a+1-5.1+lenny1_all.deb
emacs21-nox_21.4a+1-5.1+lenny1_i386.deb
  to pool/main/e/emacs21/emacs21-nox_21.4a+1-5.1+lenny1_i386.deb
emacs21_21.4a+1-5.1+lenny1.diff.gz
  to pool/main/e/emacs21/emacs21_21.4a+1-5.1+lenny1.diff.gz
emacs21_21.4a+1-5.1+lenny1.dsc
  to pool/main/e/emacs21/emacs21_21.4a+1-5.1+lenny1.dsc
emacs21_21.4a+1-5.1+lenny1_i386.deb
  to pool/main/e/emacs21/emacs21_21.4a+1-5.1+lenny1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated emacs21 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 10 Dec 2007 16:58:47 +0100
Source: emacs21
Binary: emacs21-el emacs21-common emacs21-nox emacs21-bin-common emacs21
Architecture: source all i386
Version: 21.4a+1-5.1+lenny1
Distribution: testing-security
Urgency: high
Maintainer: Rob Browning <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description: 
 emacs21    - The GNU Emacs editor
 emacs21-bin-common - The GNU Emacs editor's shared, architecture dependent 
files
 emacs21-common - The GNU Emacs editor's shared, architecture independent 
infrastru
 emacs21-el - GNU Emacs LISP (.el) files
 emacs21-nox - The GNU Emacs editor (without X support)
Closes: 455433
Changes: 
 emacs21 (21.4a+1-5.1+lenny1) testing-security; urgency=high
 .
   * Non-maintainer upload by testing-security team.
   * This update addresses the following security issue:
     - CVE-2007-6109: A stack-based buffer overflow in the format function
       when dealing with high precision values could lead to arbitrary code
       execution.
       Added upstream patch (CVE-2007-6109.diff) to fix this (Closes: #455433).
Files: 
 3ff2419cbde7097069b28806400ac6e9 894 editors optional 
emacs21_21.4a+1-5.1+lenny1.dsc
 dc68ff51bdece63f883c170754909993 182647 editors optional 
emacs21_21.4a+1-5.1+lenny1.diff.gz
 d6ab932374e2b12e2d36626c7690c866 9441994 editors optional 
emacs21-common_21.4a+1-5.1+lenny1_all.deb
 debe6955487ce2a3011094b2e2ae4ffe 7213702 editors optional 
emacs21-el_21.4a+1-5.1+lenny1_all.deb
 10d40297bb6f7721dcbbbc2d7e766498 2025520 editors optional 
emacs21_21.4a+1-5.1+lenny1_i386.deb
 5ec3ee7cb293d5b9c9f24811e1445699 1828140 editors optional 
emacs21-nox_21.4a+1-5.1+lenny1_i386.deb
 2e8e3a722b2a154630352c019661ac51 148942 editors optional 
emacs21-bin-common_21.4a+1-5.1+lenny1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHXX0hHYflSXNkfP8RAnpAAJ9tyr2PAGJOcV2c5h/36VloNlQvZQCfQUiv
R+kMTfxf6uRiUqJS3TUO8sw=
=Y21c
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to