drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in emacs
| Name: |
Zwei Probleme in emacs |
|
| ID: |
SSA:2025-057-01 |
|
| Distribution: |
Slackware |
|
| Plattformen: |
Slackware -current, Slackware x86_64 -current, Slackware 15.0, Slackware x86_64 15.0 |
|
| Datum: |
Mi, 26. Februar 2025, 23:09 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-53920
https://www.cve.org/CVERecord?id=CVE-2025-1244 |
|
| Applikationen: |
Emacs |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] emacs (SSA:2025-057-01)
New emacs packages are available for Slackware 15.0 and -current to fix security issues.
Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/emacs-30.1-i586-1_slack15.0.txz: Upgraded. This update fixes two security issues: Fix shell injection vulnerability in man.el (CVE-2025-1244). New user option 'trusted-content' to allow potentially dangerous features. This option lists those files and directories whose content Emacs should consider as sufficiently trusted to run any part of the code contained therein even without any explicit user request. For example, Flymake's backend for Emacs Lisp consults this option and disables itself with an "untrusted content" warning if the file is not listed. Emacs Lisp authors should note that a major or minor mode must never set this option to the ':all' value. This option is used to fix CVE-2024-53920. Thanks to pbslxw for the heads-up. For more information, see: https://www.cve.org/CVERecord?id=CVE-2025-1244 https://www.cve.org/CVERecord?id=CVE-2024-53920 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 15.0: emacs-30.1-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0: emacs-30.1-x86_64-1_slack15.0.txz
Updated package for Slackware -current: emacs-30.1-i686-1.txz
Updated package for Slackware x86_64 -current: emacs-30.1-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 15.0 package: 7f9a4dee990732eaf086f6d90906a05a emacs-30.1-i586-1_slack15.0.txz
Slackware x86_64 15.0 package: 68c8414823407b3eb297ef3434e04674 emacs-30.1-x86_64-1_slack15.0.txz
Slackware -current package: 30407fb50cf96c95b660e4aafcbbc909 e/emacs-30.1-i686-1.txz
Slackware x86_64 -current package: 293c63e33dbaaf457c83545012a91ccb e/emacs-30.1-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg emacs-30.1-i586-1_slack15.0.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTsVknaQB4iq/pnNu9qRGPAQBAiMwUCZ791sgAKCRBqRGPAQBAi MymaAJ909StAdWV+K0ypMf2KYiwnNpcvTACcDespnd39sJ9QJrkc2Xv9qTJqQBo= =gSv9 -----END PGP SIGNATURE-----
|
|
|
|