When the Emacs user option `enable-local-variables' is set to `:safe' (the default value is t), Emacs should automatically refuse to evaluate `eval' forms in file-local variable sections. Due to the bug, Emacs instead automatically evaluates such `eval' forms. Thus, if the user changes the value of `enable-local-variables' to `:safe', visiting a malicious file can cause automatic execution of arbitrary Emacs Lisp code with the permissions of the user. Bug tracker ref: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155 Bump PKGREVISION.
10 lines
541 B
Text
10 lines
541 B
Text
$NetBSD: distinfo,v 1.4 2012/08/13 06:38:50 wiz Exp $
|
|
|
|
SHA1 (emacs-24.1.tar.gz) = f064396724a27c83b79b2d890d188abebaa5975e
|
|
RMD160 (emacs-24.1.tar.gz) = 0fed00042339f46b29449bd561d2f881d13d8d38
|
|
Size (emacs-24.1.tar.gz) = 51473111 bytes
|
|
SHA1 (patch-aa) = dc41270debcdeba46056590ff99e72e79bd04729
|
|
SHA1 (patch-ab) = 3021afead5011aa864a2734eeb72136c36580fb2
|
|
SHA1 (patch-ad) = adc347ccd6edeb6e7ad96eeb98d6ee64176fb143
|
|
SHA1 (patch-ag) = 3e6ee4774189185af10eada9c935120491318313
|
|
SHA1 (patch-lisp_files.el) = 9963e3b6485ae569818f64ab878c3eb46895333d
|