Twenty Year Anniversary

Slackware Security Advisory - emacs Updates

Slackware Security Advisory - emacs Updates
Posted Sep 14, 2017
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New emacs packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
MD5 | 32676234c29c551288bb3964e7632b18

Slackware Security Advisory - emacs Updates

Change Mirror Download


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] emacs (SSA:2017-255-01)

New emacs packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix a security issue.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/emacs-25.3-i586-1_slack14.2.txz: Upgraded.
This update fixes a security vulnerability in Emacs. Gnus no longer
supports "richtext" and "enriched" inline MIME objects. This support
was disabled to avoid evaluation of arbitrary Lisp code contained in
email messages and news articles.
For more information, see:
http://seclists.org/oss-sec/2017/q3/422
https://bugs.gnu.org/28350
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/emacs-25.3-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/emacs-25.3-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/emacs-25.3-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/emacs-25.3-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/emacs-25.3-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/emacs-25.3-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/emacs-25.3-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/emacs-25.3-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/emacs-25.3-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/emacs-25.3-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/emacs-25.3-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/emacs-25.3-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/e/emacs-25.3-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/e/emacs-25.3-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
cb73ff55d419dc81547ac2b5d740d014 emacs-25.3-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
a2618ea276aebd927fb03fe864b34223 emacs-25.3-x86_64-1_slack13.0.txz

Slackware 13.1 package:
d4eee6b4b3bad0cdee8423952ab30cff emacs-25.3-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
75877cfa279dfeec1684c487490c817a emacs-25.3-x86_64-1_slack13.1.txz

Slackware 13.37 package:
1c94eac53cd078b2364b173f88b10b37 emacs-25.3-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
9f27de078b8c58efcc10e871dbafe656 emacs-25.3-x86_64-1_slack13.37.txz

Slackware 14.0 package:
bbf7e859465caa21973afea4c7c19654 emacs-25.3-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
b129723e1bfc10a1fcbe26a02136c0ce emacs-25.3-x86_64-1_slack14.0.txz

Slackware 14.1 package:
59c43a96b840cd3bb48d917abc8cfbae emacs-25.3-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
910c52e7f87b65a0238199af9e052695 emacs-25.3-x86_64-1_slack14.1.txz

Slackware 14.2 package:
edf008d474c5bd7bfc63425fd03e826e emacs-25.3-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
b4317b3527a9df8d9c4595bac93801bd emacs-25.3-x86_64-1_slack14.2.txz

Slackware -current package:
02d65f09f2bbe0e16900cfc49379920a e/emacs-25.3-i586-1.txz

Slackware x86_64 -current package:
f15b8e4e8ef33058f8b07bc2d2b02be8 e/emacs-25.3-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg emacs-25.3-i586-1_slack14.2.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAlm4XdMACgkQakRjwEAQIjOAdgCePUlBwPu2GUcXUqgIj0tzsytO
L6AAmwYTYkbZrGMLf8wCG7F8sp0FzZ3F
=yNAE
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    7 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    40 Files
  • 23
    May 23rd
    64 Files
  • 24
    May 24th
    55 Files
  • 25
    May 25th
    16 Files
  • 26
    May 26th
    17 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close