Linux Today: Linux News On Internet Time.

Linux-Mandrake Security Update Advisory: emacs update

Jan 02, 2001, 20:43 (0 Talkback[s])

Date: Sun, 31 Dec 2000 14:52:05 -0700
From: Linux Mandrake Security Team security@LINUX-MANDRAKE.COM
Subject: MDKSA-2000:088 - emacs update

                Linux-Mandrake Security Update Advisory

Package name:           emacs
Date:                   December 31st, 2000
Advisory ID:            MDKSA-2000:088

Affected versions:      6.0, 6.1, 7.0

Problem Description:

A vulnerability exists in Emacs 20.6 and prior that allows any user on a multiuser system to eavesdrop on, or forge responses to, an Emacs client. The vulnerability stems from Emacs' failure to properly set permissions for slave PTY devices.

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command:
rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.

Linux-Mandrake 6.0:
9d53a902aaf0b2ab69927d15a9933acd 6.0/RPMS/emacs-20.6-8.1mdk.i586.rpm
e8ae9cbfd3b9bd96bee524f52359d1f3 6.0/RPMS/emacs-el-20.6-8.1mdk.i586.rpm
83c830ac5467f611237ba5e183eebb56 6.0/RPMS/emacs-leim-20.6-8.1mdk.i586.rpm
a2f5b39d8ee04e4ac664989dacdff5e4 6.0/RPMS/emacs-nox-20.6-8.1mdk.i586.rpm
3c2664f80ccaeb7e85a89fc3920c5887 6.0/RPMS/emacs-X11-20.6-8.1mdk.i586.rpm
710a849a5fa9b52a8c30ed0a86705d9e 6.0/SRPMS/emacs-20.6-8.1mdk.src.rpm

Linux-Mandrake 6.1:
4fb0c48430873347a71fae4fbac39d48 6.1/RPMS/emacs-20.6-8.1mdk.i586.rpm
eb1ec6fcef2703ba8ed825a97f8233b2 6.1/RPMS/emacs-el-20.6-8.1mdk.i586.rpm
dae51c47102cb3526654d2064d5ab860 6.1/RPMS/emacs-leim-20.6-8.1mdk.i586.rpm
d6932030d2a37e757e7194626e89941c 6.1/RPMS/emacs-nox-20.6-8.1mdk.i586.rpm
18cf4174338d31d07fe88dd9ae5618da 6.1/RPMS/emacs-X11-20.6-8.1mdk.i586.rpm
710a849a5fa9b52a8c30ed0a86705d9e 6.1/SRPMS/emacs-20.6-8.1mdk.src.rpm

Linux-Mandrake 7.0:
2e2f0f630c492ceeec64d176c3c71c4a 7.0/RPMS/emacs-20.6-8.1mdk.i586.rpm
e9c5cb445f863d6a2393e67c8bdecc4d 7.0/RPMS/emacs-el-20.6-8.1mdk.i586.rpm
c0d94ad3a670e28b833619283f0d0826 7.0/RPMS/emacs-leim-20.6-8.1mdk.i586.rpm
69750c8e1373e7837910bd2edac24aea 7.0/RPMS/emacs-nox-20.6-8.1mdk.i586.rpm
537601d9abb483f28050695e7cae7010 7.0/RPMS/emacs-X11-20.6-8.1mdk.i586.rpm
710a849a5fa9b52a8c30ed0a86705d9e 7.0/SRPMS/emacs-20.6-8.1mdk.src.rpm

To upgrade automatically, use <<MandrakeUpdate>>.

If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name".

You can download the updates directly from:

Or try one of the other mirrors listed at:


Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.1, look for it in "updates/7.1/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them.

Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors.

You can view other security advisories for Linux-Mandrake at:


If you want to report vulnerabilities, please contact


Linux-Mandrake has two security-related mailing list services that anyone can subscribe to:


Linux-Mandrake's security announcements mailing list. Only announcements are sent to this list and it is read-only.


Linux-Mandrake's security discussion mailing list. This list is open to anyone to discuss Linux-Mandrake security specifically and Linux security in general.

To subscribe to either list, send a message to sympa@linux-mandrake.com with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to sympa@linux-mandrake.com with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to sympa@linux-mandrake.com with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe from either list: