emacs-27.2-8.el9.1
エラータID: AXSA:2023-6067:07
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the MIRACLE LINUX (CVE-2023-2491)
* emacs: command execution via shell metacharacters (CVE-2022-48337)
* emacs: local command injection in ruby-mode.el (CVE-2022-48338)
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-48338
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
CVE-2023-2491
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Update packages.
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
N/A
SRPMS
- emacs-27.2-8.el9.1.src.rpm
MD5: 022dda78567cccf5f934b47fcf49d389
SHA-256: 9346e83b3af09052d6cb394cb4296f4c699d2552b7493d9d1bd24683fd24bf84
Size: 42.74 MB
Asianux Server 9 for x86_64
- emacs-27.2-8.el9.1.x86_64.rpm
MD5: 41c3fedea59018459818487de02f255b
SHA-256: 858bf89886d07cf9af48258bd23b42a8772f576b5ceaa995b00b839ac5008cce
Size: 3.28 MB - emacs-common-27.2-8.el9.1.x86_64.rpm
MD5: 95aa6caea081367c027e9f408babc13c
SHA-256: eea0e0acf9234e09b259c7c77764c50b0ab03835b4999e4726ea6469ef55e93d
Size: 35.34 MB - emacs-filesystem-27.2-8.el9.1.noarch.rpm
MD5: aa28836a54c8f68ff3c8a33124ebfa6d
SHA-256: 0e01e7e4f581c0de0dcd8c66c6fa5968e0b0f20150068fc324183e128a58a5eb
Size: 7.89 kB - emacs-lucid-27.2-8.el9.1.x86_64.rpm
MD5: d3b03ccc8c03cd716d72061b645cc314
SHA-256: f9f3b7aa7b6e3b84a18482692c937c5e24893af5fedb069594feb418343de7b9
Size: 3.24 MB - emacs-nox-27.2-8.el9.1.x86_64.rpm
MD5: b3d2dcbd85a12d83e8ef38eee2873dbc
SHA-256: 37df8f4239c302bf2048c3cc283726aac155e94cdc56df8d6b5ac2487df83d37
Size: 2.83 MB