Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59874
Category:Fedora Local Security Checks
Title:Fedora Core 8 FEDORA-2007-2946 (emacs)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to emacs
announced via advisory FEDORA-2007-2946.

Emacs is a powerful, customizable, self-documenting, modeless text
editor. Emacs contains special code editing features, a scripting
language (elisp), and the capability to read mail, news, and more
without leaving the editor.

This package provides an emacs binary with support for X windows.

ChangeLog:

* Tue Nov 6 2007 Chip Coldwell 22.1-8
- fix insufficient safe-mode checks (Resolves: bz367591)
* Thu Nov 1 2007 Chip Coldwell 22.1-7
- Update rpm-spec-mode to the current upstream, drop compat patch (bz306841)
References:

[ 1 ] Bug #367591 - CVE-2007-5795 emacs insufficient safe mode checks [f8]
https://bugzilla.redhat.com/show_bug.cgi?id=367591
[ 2 ] Bug #306841 - rpm-spec-mode unable to add changelog entries
https://bugzilla.redhat.com/show_bug.cgi?id=306841
[ 3 ] Bug #366801 - CVE-2007-5795 emacs insufficient safe mode checks
https://bugzilla.redhat.com/show_bug.cgi?id=366801
[ 4 ] CVE-2007-5795
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795
Updated packages:

c1e0034a6635e2da30fc539d19ff642e5cbf3796 emacs-el-22.1-8.fc8.ppc64.rpm
01ed0c587b59f3654054d88db54e5723a5dbc007 emacs-debuginfo-22.1-8.fc8.ppc64.rpm
5e5221f9f6885db39769ac331f9d0c44e569dab8 emacs-common-22.1-8.fc8.ppc64.rpm
0cd0c73e830de77232badb7140aeeb708e5dc51a emacs-22.1-8.fc8.ppc64.rpm
633401bbf469c1fddbf4d914270b4cefdfee8cc4 emacs-nox-22.1-8.fc8.ppc64.rpm
857651ca84a073485c8e271c2fcd7405951459dd emacs-debuginfo-22.1-8.fc8.i386.rpm
3a470676945503fcbcf74665cfb4282cf007a616 emacs-nox-22.1-8.fc8.i386.rpm
12055d54cbb670c9a916ff4908638f4804369de5 emacs-el-22.1-8.fc8.i386.rpm
22d7cd097a1b5cb7dcfb3d9c292a175884735b37 emacs-common-22.1-8.fc8.i386.rpm
d1c16cdad67cd9849540022e51f5ce6b1a3d764e emacs-22.1-8.fc8.i386.rpm
2b8494d9b8bc43823b6c3759e97f5bd8e7133ae2 emacs-el-22.1-8.fc8.x86_64.rpm
c972701d3ebeb7975574b26e2b83568505c6b287 emacs-22.1-8.fc8.x86_64.rpm
6dfe7d0f11a02965dfbbfdf2f3b8d205ba1da098 emacs-debuginfo-22.1-8.fc8.x86_64.rpm
dadc7c34bd33fbf57fc51e051cb0e94bea8b7c71 emacs-common-22.1-8.fc8.x86_64.rpm
d0d0856323e00ba182b5862f3e51113ef447fcdb emacs-nox-22.1-8.fc8.x86_64.rpm
f574918bf01c1b633f6d64aa1cf14ce1d46f6856 emacs-el-22.1-8.fc8.ppc.rpm
c5da646527fcb265d793f83e7c22695eb0af48ee emacs-common-22.1-8.fc8.ppc.rpm
6f908b7e1bec893b8d06cfee09a5bfdba56ca291 emacs-nox-22.1-8.fc8.ppc.rpm
0a2c80abe3ce9ed544ff5eb25a8ba0caccbae858 emacs-22.1-8.fc8.ppc.rpm
241d11621162b80254876d0225736f088408a184 emacs-debuginfo-22.1-8.fc8.ppc.rpm
78711155481c0ab2f8f381360e36ce920370f11d emacs-22.1-8.fc8.src.rpm

This update can be installed with the yum update program. Use
su -c 'yum update emacs'
at the command line. For more information, refer to Managing Software
with yum, available at http://docs.fedoraproject.org/yum/.

Solution: Apply the appropriate updates.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-2946

Risk factor : High

CVSS Score:
6.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-5795
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 26327
http://www.securityfocus.com/bid/26327
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00524.html
http://security.gentoo.org/glsa/glsa-200712-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:034
http://osvdb.org/42060
http://secunia.com/advisories/27508
http://secunia.com/advisories/27627
http://secunia.com/advisories/27728
http://secunia.com/advisories/27984
http://secunia.com/advisories/29420
http://www.ubuntu.com/usn/usn-541-1
http://www.vupen.com/english/advisories/2007/3715
http://www.vupen.com/english/advisories/2008/0924/references
XForce ISS Database: emacs-hacklocalvariables-security-bypass(38263)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38263
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.