Date: Wed, 5 May 2010 10:34:30 +0900 (JST) From: Yasuhiro KIMURA <yasu@utahime.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/146318: [PATCH] security/vuxml: emacs-23.1_6, 1 is still vulnerable Message-ID: <20100505013430.950477E826@eastasia.home.utahime.org> Resent-Message-ID: <201005050140.o451e29d019988@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 146318 >Category: ports >Synopsis: [PATCH] security/vuxml: emacs-23.1_6,1 is still vulnerable >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed May 05 01:40:02 UTC 2010 >Closed-Date: >Last-Modified: >Originator: Yasuhiro KIMURA >Release: FreeBSD 8.0-RELEASE-p2 i386 >Organization: >Environment: System: FreeBSD xxx 8.0-RELEASE-p2 FreeBSD 8.0-RELEASE-p2 #0: Sat Mar 6 00:10:19 JST 2010 xxx i386 >Description: It seems emacs-23.1_6,1 is still vulnerable. >How-To-Repeat: >Fix: --- patch-vuxml begins here --- Index: vuln.xml =================================================================== RCS file: /usr0/freebsd/cvsroot/ports/security/vuxml/vuln.xml,v retrieving revision 1.2152 diff -u -r1.2152 vuln.xml --- vuln.xml 2 May 2010 15:32:40 -0000 1.2152 +++ vuln.xml 5 May 2010 01:25:53 -0000 @@ -218,7 +218,7 @@ <name>emacs</name> <range><le>21.3_14</le></range> <range><ge>22.3_1,1</ge><le>22.3_4,1</le></range> - <range><ge>23.1</ge><le>23.1_5,1</le></range> + <range><ge>23.1</ge><le>23.1_6,1</le></range> </package> <package> <name>xemacs</name> --- patch-vuxml ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100505013430.950477E826>