![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59874 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 8 FEDORA-2007-2946 (emacs) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to emacs announced via advisory FEDORA-2007-2946. Emacs is a powerful, customizable, self-documenting, modeless text editor. Emacs contains special code editing features, a scripting language (elisp), and the capability to read mail, news, and more without leaving the editor. This package provides an emacs binary with support for X windows. ChangeLog: * Tue Nov 6 2007 Chip Coldwell 22.1-8 - fix insufficient safe-mode checks (Resolves: bz367591) * Thu Nov 1 2007 Chip Coldwell 22.1-7 - Update rpm-spec-mode to the current upstream, drop compat patch (bz306841) References: [ 1 ] Bug #367591 - CVE-2007-5795 emacs insufficient safe mode checks [f8] https://bugzilla.redhat.com/show_bug.cgi?id=367591 [ 2 ] Bug #306841 - rpm-spec-mode unable to add changelog entries https://bugzilla.redhat.com/show_bug.cgi?id=306841 [ 3 ] Bug #366801 - CVE-2007-5795 emacs insufficient safe mode checks https://bugzilla.redhat.com/show_bug.cgi?id=366801 [ 4 ] CVE-2007-5795 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795 Updated packages: c1e0034a6635e2da30fc539d19ff642e5cbf3796 emacs-el-22.1-8.fc8.ppc64.rpm 01ed0c587b59f3654054d88db54e5723a5dbc007 emacs-debuginfo-22.1-8.fc8.ppc64.rpm 5e5221f9f6885db39769ac331f9d0c44e569dab8 emacs-common-22.1-8.fc8.ppc64.rpm 0cd0c73e830de77232badb7140aeeb708e5dc51a emacs-22.1-8.fc8.ppc64.rpm 633401bbf469c1fddbf4d914270b4cefdfee8cc4 emacs-nox-22.1-8.fc8.ppc64.rpm 857651ca84a073485c8e271c2fcd7405951459dd emacs-debuginfo-22.1-8.fc8.i386.rpm 3a470676945503fcbcf74665cfb4282cf007a616 emacs-nox-22.1-8.fc8.i386.rpm 12055d54cbb670c9a916ff4908638f4804369de5 emacs-el-22.1-8.fc8.i386.rpm 22d7cd097a1b5cb7dcfb3d9c292a175884735b37 emacs-common-22.1-8.fc8.i386.rpm d1c16cdad67cd9849540022e51f5ce6b1a3d764e emacs-22.1-8.fc8.i386.rpm 2b8494d9b8bc43823b6c3759e97f5bd8e7133ae2 emacs-el-22.1-8.fc8.x86_64.rpm c972701d3ebeb7975574b26e2b83568505c6b287 emacs-22.1-8.fc8.x86_64.rpm 6dfe7d0f11a02965dfbbfdf2f3b8d205ba1da098 emacs-debuginfo-22.1-8.fc8.x86_64.rpm dadc7c34bd33fbf57fc51e051cb0e94bea8b7c71 emacs-common-22.1-8.fc8.x86_64.rpm d0d0856323e00ba182b5862f3e51113ef447fcdb emacs-nox-22.1-8.fc8.x86_64.rpm f574918bf01c1b633f6d64aa1cf14ce1d46f6856 emacs-el-22.1-8.fc8.ppc.rpm c5da646527fcb265d793f83e7c22695eb0af48ee emacs-common-22.1-8.fc8.ppc.rpm 6f908b7e1bec893b8d06cfee09a5bfdba56ca291 emacs-nox-22.1-8.fc8.ppc.rpm 0a2c80abe3ce9ed544ff5eb25a8ba0caccbae858 emacs-22.1-8.fc8.ppc.rpm 241d11621162b80254876d0225736f088408a184 emacs-debuginfo-22.1-8.fc8.ppc.rpm 78711155481c0ab2f8f381360e36ce920370f11d emacs-22.1-8.fc8.src.rpm This update can be installed with the yum update program. Use su -c 'yum update emacs' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. Solution: Apply the appropriate updates. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-2946 Risk factor : High CVSS Score: 6.3 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-5795 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html BugTraq ID: 26327 http://www.securityfocus.com/bid/26327 https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00524.html http://security.gentoo.org/glsa/glsa-200712-03.xml http://www.mandriva.com/security/advisories?name=MDVSA-2008:034 http://osvdb.org/42060 http://secunia.com/advisories/27508 http://secunia.com/advisories/27627 http://secunia.com/advisories/27728 http://secunia.com/advisories/27984 http://secunia.com/advisories/29420 http://www.ubuntu.com/usn/usn-541-1 http://www.vupen.com/english/advisories/2007/3715 http://www.vupen.com/english/advisories/2008/0924/references XForce ISS Database: emacs-hacklocalvariables-security-bypass(38263) https://exchange.xforce.ibmcloud.com/vulnerabilities/38263 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |