Lucene search

K
mageiaGentoo FoundationMGASA-2023-0152
HistoryApr 24, 2023 - 3:20 a.m.

Updated emacs packages fix security vulnerability

2023-04-2403:20:26
Gentoo Foundation
advisories.mageia.org
19
emacs
packages
security
vulnerability
org mode
arbitrary commands
shell metacharacters
directory name
cve-2023-28617
unix

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

30.2%

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. (CVE-2023-28617)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchemacs< 27.1-1.4emacs-27.1-1.4.mga8

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

30.2%