On Fri, Feb 24, 2023 at 06:32:46PM +0000, Adam D. Barratt wrote:
> Source: emacs
> Version: 1:27.1+1-3.1+deb11u2
> Severity: grave
> Control: affects -1 + security.debian.org
> Control: affects -1 + release.debian.org
> X-Debbugs-Cc: t...@security.debian.org
> X-Debbugs-Cc: debian-ad...@lists.debian.org
> 
> Hi,
> 
> Upgrading emacs-nox on a bullseye mips64el system to the latest
> security update fails:
> 
> Setting up emacs-nox (1:27.1+1-3.1+deb11u2) ...
> update-alternatives: using /usr/bin/emacs-nox to provide /usr/bin/emacs 
> (emacs) in auto mode
> Install emacsen-common for emacs
> emacsen-common: Handling install of emacsen flavor emacs
> emacs: could not load dump file 
> "/usr/lib/emacs/27.1/mips64el-linux-gnuabi64/emacs.pdmp": out of memory
> ERROR: install script from emacsen-common package failed
> dpkg: error processing package emacs-nox (--configure):
>  installed emacs-nox package post-installation script subprocess returned 
> error exit status 1
> 
> Downgrading to +deb11u1 on the same system works fine. Removing the
> emacs packages and installing +deb11u2 directly fails in the same way.
>...

In the upstream bug for CVE-2022-48337 there was originally[1]
+          free (new_real_name);
+          free (new_tmp_name);
in the fix that later disappeared (by accident?).

I would say the CVE-2022-48337 fix introduced a memory leak,
which might or might not be related to the mips64el problem.

> Regards,
> 
> Adam

cu
Adrian

[1] https://debbugs.gnu.org/cgi/bugreport.cgi?bug=59817#23

Reply via email to