[emacs] [CVE-2007-6109] buffer overflow

Bug #174177 reported by disabled.user
254
Affects Status Importance Assigned to Milestone
emacs21 (Ubuntu)
Fix Released
Undecided
Unassigned
Dapper
Fix Released
Undecided
Jamie Strandboge
Feisty
Fix Released
Undecided
Jamie Strandboge
Gutsy
Fix Released
Undecided
Jamie Strandboge
Hardy
Fix Released
Undecided
Unassigned
Intrepid
Fix Released
Undecided
Unassigned
emacs22 (Debian)
Fix Released
Unknown
emacs22 (Ubuntu)
Fix Released
Undecided
Jamie Strandboge
Dapper
Invalid
Undecided
Unassigned
Feisty
Invalid
Undecided
Unassigned
Gutsy
Fix Released
Undecided
Jamie Strandboge
Hardy
Fix Released
Undecided
Jamie Strandboge
Intrepid
Fix Released
Undecided
Jamie Strandboge

Bug Description

Binary package hint: emacs

References:
[1] CVE-2007-6109 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109)
[2] SUSE-SR:2007:025

Quoting [2]:
"A buffer overflow was fixed in emacs that can be triggered over the command-line."

Revision history for this message
Michael Olson (mwolson) wrote :

Can you point me to a place where I can find the patch for this vulnerability? I downloaded emacs-22.1-40.7.src.rpm from OpenSuSE, but couldn't find the patch that fixes this. Also, how certain is it that this effects emacs22? I noticed a couple of emacs security downloads from Novell dated at Nov. 28-29, but they were all for emacs-21.

Revision history for this message
disabled.user (disabled.user-deactivatedaccount) wrote :

Sorry, I'm just cross-checking security advisories / announcements from various major GNU/Linux distributions and some other sources in my scarcely available free time and report possibly affected Ubuntu packages in Launchpad, hoping that the report gets into the right hands.

For now, a quick googling for "CVE-2007-6109 emacs" nets no helpful results that could be more specific regarding this vulnerability.

Revision history for this message
Michael Olson (mwolson) wrote :

Thanks for the report, hk47, and thanks for the link, Reinhard. I'll prepare a fixed version later today.

Revision history for this message
Reinhard Tartler (siretart) wrote :

emacs22 (22.1-0ubuntu8) hardy; urgency=low

  * Security fix: patches/CVE-2007-6109.diff. Patch from upstream Romain
    Francoise! (LP: #174177)

 -- Reinhard Tartler <email address hidden> Fri, 14 Dec 2007 15:47:26 +0100

Changed in emacs22:
status: New → Fix Released
Changed in emacs22:
status: Unknown → Fix Released
Revision history for this message
Michael Olson (mwolson) wrote :

It looks like there was a regression introduced by the initial Debian patch. See <http://bugs.debian.org/456235> for the fix.

Revision history for this message
disabled.user (disabled.user-deactivatedaccount) wrote :

Have there been any updates for the stable releases?

Changed in emacs22:
status: New → Invalid
Chuck Short (zulcss)
Changed in emacs22:
status: New → Won't Fix
Changed in emacs22:
status: New → Invalid
Chuck Short (zulcss)
Changed in emacs22:
status: Won't Fix → New
Changed in emacs22:
assignee: nobody → jdstrand
status: New → In Progress
Changed in emacs21:
assignee: nobody → jdstrand
status: New → In Progress
assignee: nobody → jdstrand
status: New → In Progress
assignee: nobody → jdstrand
status: New → In Progress
Changed in emacs21:
status: In Progress → Fix Committed
status: In Progress → Fix Committed
status: In Progress → Fix Committed
Changed in emacs22:
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package emacs22 - 22.1-0ubuntu5.2

---------------
emacs22 (22.1-0ubuntu5.2) gutsy-security; urgency=low

  * SECURITY UPDATE: buffer overflow in format function
  * debian/patches/fix-format-overflow.diff: fix src/editfns.c to account
    for precision in integer formatting (LP: #174177)
  * SECURITY UPDATE: temporary file race condition in vcdiff
  * debian/patches/vcdiff-tmp-race.diff: update lib-src/vcdiff to use
    mktemp
  * References
    CVE-2007-6109
    CVE-2008-1694

 -- Jamie Strandboge <email address hidden> Thu, 01 May 2008 10:58:07 -0400

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package emacs21 - 21.4a+1-5ubuntu4.1

---------------
emacs21 (21.4a+1-5ubuntu4.1) gutsy-security; urgency=low

  * SECURITY UPDATE: buffer overflow in format function
  * debian/patches/fix-format-overflow.diff: fix src/editfns.c to account
    for precision in integer formatting (LP: #174177)
  * SECURITY UPDATE: temporary file race condition in vcdiff
  * debian/patches/vcdiff-tmp-race.diff: update lib-src/vcdiff to use
    mktemp
  * References
    CVE-2007-6109
    CVE-2008-1694

 -- Jamie Strandboge <email address hidden> Thu, 01 May 2008 11:12:04 -0400

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package emacs21 - 21.4a+1-2ubuntu1.2

---------------
emacs21 (21.4a+1-2ubuntu1.2) feisty-security; urgency=low

  * SECURITY UPDATE: buffer overflow in format function
  * debian/patches/fix-format-overflow.diff: fix src/editfns.c to account
    for precision in integer formatting (LP: #174177)
  * SECURITY UPDATE: temporary file race condition in vcdiff
  * debian/patches/vcdiff-tmp-race.diff: update lib-src/vcdiff to use
    mktemp
  * References
    CVE-2007-6109
    CVE-2008-1694

 -- Jamie Strandboge <email address hidden> Thu, 01 May 2008 17:10:27 -0400

Changed in emacs21:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Changed in emacs22:
status: Fix Committed → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :
Changed in emacs21:
status: Fix Committed → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Intrepid is still vulnerable to CVE-2008-1694.

Changed in emacs22:
assignee: nobody → jdstrand
status: New → Fix Released
assignee: nobody → jdstrand
status: Fix Released → In Progress
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package emacs22 - 22.2-0ubuntu2

---------------
emacs22 (22.2-0ubuntu2) intrepid; urgency=low

  * SECURITY UPDATE: temporary file race condition in vcdiff (LP: #174177)
  * debian/patches/fix-vcdiff-tmp-race.diff: update lib-src/vcdiff to use
    mktemp
  * References
    CVE-2008-1694

 -- Jamie Strandboge <email address hidden> Thu, 04 Sep 2008 09:27:58 -0500

Changed in emacs22:
status: In Progress → Fix Released
Changed in emacs21:
status: New → Fix Released
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.