Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-3481

Опубликовано: 07 июн. 2023
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2023-3481: emacs security update (MODERATE)

[1:24.3-23.1]

  • Fix htmlfontify.el command injection vulnerability (#2175177)

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

emacs

24.3-23.el7_9.1

emacs-common

24.3-23.el7_9.1

emacs-el

24.3-23.el7_9.1

emacs-filesystem

24.3-23.el7_9.1

emacs-nox

24.3-23.el7_9.1

emacs-terminal

24.3-23.el7_9.1

Oracle Linux x86_64

emacs

24.3-23.el7_9.1

emacs-common

24.3-23.el7_9.1

emacs-el

24.3-23.el7_9.1

emacs-filesystem

24.3-23.el7_9.1

emacs-nox

24.3-23.el7_9.1

emacs-terminal

24.3-23.el7_9.1

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
redhat
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
nvd
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has ...