Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Sep 2017 13:22:14 +0000 (UTC)
From:      Ashish SHUKLA <ashish@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r449782 - head/security/vuxml
Message-ID:  <201709131322.v8DDMERV027154@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: ashish
Date: Wed Sep 13 13:22:14 2017
New Revision: 449782
URL: https://svnweb.freebsd.org/changeset/ports/449782

Log:
  - Add emacs-devel to the list of affected packages by emacs vulnerability
  - Move it to the top, didn't realize this before. Sorry

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Sep 13 13:15:55 2017	(r449781)
+++ head/security/vuxml/vuln.xml	Wed Sep 13 13:22:14 2017	(r449782)
@@ -89,6 +89,42 @@ Notes:
     </dates>
   </vuln>
 
+  <vuln vid="47e2e52c-975c-11e7-942d-5404a68a61a2">
+    <topic>emacs -- enriched text remote code execution vulnerability</topic>
+    <affects>
+      <package>
+	<name>emacs25</name>
+	<name>emacs-nox11</name>
+	<range><lt>25.3,3</lt></range>
+      </package>
+      <package>
+	<name>emacs-devel</name>
+	<range><lt>26.0.50.20170912,2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Paul Eggert reports:</p>
+	<blockquote cite="http://seclists.org/oss-sec/2017/q3/422">;
+	  <p>Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs.</p>
+	  <p>When Emacs renders MIME text/enriched data (Internet RFC 1896), it
+	  is vulnerable to arbitrary code execution. Since Emacs-based mail
+	  clients decode "Content-Type: text/enriched", this code is exploitable
+	  remotely. This bug affects GNU Emacs versions 19.29 through 25.2.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://seclists.org/oss-sec/2017/q3/422</url>;
+      <url>https://bugs.gnu.org/28350</url>;
+    </references>
+    <dates>
+      <discovery>2017-09-04</discovery>
+      <entry>2017-09-12</entry>
+      <modified>2017-09-13</modified>
+    </dates>
+  </vuln>
+
   <vuln vid="f9f76a50-9642-11e7-ab09-080027b00c2e">
     <topic>cyrus-imapd -- broken "other users" behaviour</topic>
     <affects>
@@ -141752,38 +141788,6 @@ misc.c:
     <dates>
       <discovery>2005-09-23</discovery>
       <entry>2005-09-29</entry>
-    </dates>
-  </vuln>
-
-  <vuln vid="47e2e52c-975c-11e7-942d-5404a68a61a2">
-    <topic>emacs -- enriched text remote code execution vulnerability</topic>
-    <affects>
-      <package>
-	<name>emacs25</name>
-	<name>emacs-nox11</name>
-	<range><lt>25.3,3</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Paul Eggert reports:</p>
-	<blockquote cite="http://seclists.org/oss-sec/2017/q3/422">;
-	  <p>Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs.</p>
-	  <p>When Emacs renders MIME text/enriched data (Internet RFC 1896), it
-	  is vulnerable to arbitrary code execution. Since Emacs-based mail
-	  clients decode "Content-Type: text/enriched", this code is exploitable
-	  remotely. This bug affects GNU Emacs versions 19.29 through 25.2.</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <url>http://seclists.org/oss-sec/2017/q3/422</url>;
-      <url>https://bugs.gnu.org/28350</url>;
-    </references>
-    <dates>
-      <discovery>2017-09-04</discovery>
-      <entry>2017-09-12</entry>
-      <modified>2017-09-12</modified>
     </dates>
   </vuln>
 </vuxml><!-- EOF -->



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201709131322.v8DDMERV027154>