| Summary: | emacs new security issues CVE-2014-342[1-4] | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/600793/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | emacs-24.3-4.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-05-30 17:53:22 CEST
David Walser
2014-05-30 17:53:28 CEST
Whiteboard:
(none) =>
MGA3TOO
David Walser
2014-05-30 19:35:44 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/600793/ Checked the patches were applied to the files mentioned in the original report (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747100) with madb rpmdiff feature and all applied so just ensuring emacs updates/starts ok for each arch. Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure Testing complete mga4 32 & 64 Whiteboard:
MGA3TOO has_procedure =>
MGA3TOO has_procedure mga4-32-ok mga4-64-ok Testing complete mga3 32 & 64 Validating. Advisory uploaded. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2014-0250.html Status:
NEW =>
RESOLVED |