-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:076 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : emacs Date : April 8, 2013 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated emacs packages fix security vulnerabilities: Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file (CVE-2012-0035). lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file (CVE-2012-3479). Additionally a problem was fixed reading xz compressed files (mga#7759). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0035 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0261 https://bugs.mageia.org/show_bug.cgi?id=7759 _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 9b260e9fa159f6c68e0dee0ed0d7399f mbs1/x86_64/emacs-23.3-9.1.mbs1.x86_64.rpm 63eed00b5c89f6de68802b2a5bbcdcf6 mbs1/x86_64/emacs-common-23.3-9.1.mbs1.x86_64.rpm 3459071134ceb1fc8bbcebb4c312a1f0 mbs1/x86_64/emacs-doc-23.3-9.1.mbs1.x86_64.rpm 24e110f385b024074ea7f42e08a86c38 mbs1/x86_64/emacs-el-23.3-9.1.mbs1.noarch.rpm b35e183582665f3518c2ca9184a7d60a mbs1/x86_64/emacs-leim-23.3-9.1.mbs1.x86_64.rpm 524f81af35d86dd3d9fde1d255e6d394 mbs1/x86_64/emacs-nox-23.3-9.1.mbs1.x86_64.rpm b9fd621ceca317114cc18dc60734b05b mbs1/SRPMS/emacs-23.3-9.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRYwPQmqjQ0CJFipgRAmvqAJ41LzlgtdGbGGYrq/XRCwbvYXI5rwCgnK5I Pn2prMrM7ln2/Qk52+sYsoE= =Fi63 -----END PGP SIGNATURE-----