Lucene search

K
gentooGentoo FoundationGLSA-202409-19
HistorySep 22, 2024 - 12:00 a.m.

Emacs, org-mode: Command Execution Vulnerability

2024-09-2200:00:00
Gentoo Foundation
security.gentoo.org
2
emacs
org-mode
command execution
vulnerability
unsafe functions
arbitrary code execution
upgrade
latest version

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

Background

Emacs is the extensible, customizable, self-documenting real-time display editor. org-mode is an Emacs mode for notes and project planning.

Description

%(…) link abbreviations could specify unsafe functions.

Impact

Opening a malicious org-mode file could result in arbitrary code execution.

Workaround

There is no known workaround at this time.

Resolution

All Emacs users should upgrade to the latest version according to the installed slot, one of:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-editors/emacs-26.3-r19:26"

Alternatively:

 # emerge --ask --oneshot --verbose ">=app-editors/emacs-27.2-r17:27"
 


 # emerge --ask --oneshot --verbose ">=app-editors/emacs-28.2-r13:28"
 


 # emerge --ask --oneshot --verbose ">=app-editors/emacs-29.3-r3:29"

All org-mode users should upgrade to the latest package:

 # emerge --ask --oneshot --verbose ">=app-emacs/org-mode-9.7.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-editors/emacs< 26.3-r19UNKNOWN
Gentooanyallapp-emacs/org-mode< 9.7.5UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low