Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-3042

Опубликовано: 24 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-3042: emacs security and bug fix update (MODERATE)

[1:26.1-9]

  • Fix MH-E mail composition with GNU Mailutils (#1991156)

[1:26.1-8]

  • Fix ctags local command execute vulnerability (#2149386)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

emacs

26.1-9.el8

emacs-common

26.1-9.el8

emacs-filesystem

26.1-9.el8

emacs-lucid

26.1-9.el8

emacs-nox

26.1-9.el8

emacs-terminal

26.1-9.el8

Oracle Linux x86_64

emacs

26.1-9.el8

emacs-common

26.1-9.el8

emacs-filesystem

26.1-9.el8

emacs-lucid

26.1-9.el8

emacs-nox

26.1-9.el8

emacs-terminal

26.1-9.el8

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
redhat
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
nvd
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell ...