Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-2366

Опубликовано: 15 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-2366: emacs security and bug fix update (MODERATE)

[1:27.2-8]

  • Use a 64KB page size for pdump (#1979804)

[1:27.2-7]

  • Fix ctags local command execute vulnerability (#2149387)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

emacs

27.2-8.el9

emacs-common

27.2-8.el9

emacs-filesystem

27.2-8.el9

emacs-lucid

27.2-8.el9

emacs-nox

27.2-8.el9

Oracle Linux x86_64

emacs

27.2-8.el9

emacs-common

27.2-8.el9

emacs-filesystem

27.2-8.el9

emacs-lucid

27.2-8.el9

emacs-nox

27.2-8.el9

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
redhat
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
nvd
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell ...