First published: Wed Feb 12 2025(Updated: )
A shell injection vulnerability exists in GNU Emacs due to improper handling of custom "man" URI schemes. Initially considered low severity, as it required user interaction with local files, it was later discovered that an attacker could exploit this vulnerability by tricking a user into visiting a specially crafted website or an HTTP URL with a redirect, leading to arbitrary shell command execution without further user action.This issue affects all released versions of GNU Emacs, including version 29.4. Upstream patch: <a href="https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=820f0793f0b46448928905552726c1f1b999062f">https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=820f0793f0b46448928905552726c1f1b999062f</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=29.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2345150 is classified as low but can be escalated if exploited through user interaction.
To fix REDHAT-BUG-2345150, update GNU Emacs to the latest version that addresses the shell injection vulnerability.
REDHAT-BUG-2345150 affects GNU Emacs versions up to and including 29.4.
No, REDHAT-BUG-2345150 requires user interaction, such as visiting a malicious 'man' URI scheme.
Exploiting REDHAT-BUG-2345150 can lead to arbitrary command execution in the context of the user.