Arbitrary Code Injection Affecting emacs package, versions *
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-EMACS-7369684
- published 25 Jun 2024
- disclosed 23 Jun 2024
Introduced: 23 Jun 2024
New CVE-2024-39331 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
emacs
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream emacs
package and not the emacs
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.
References
- https://access.redhat.com/security/cve/CVE-2024-39331
- https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29
- https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=f4cc61636947b5c2f0afc67174dd369fe3277aa8
- https://list.orgmode.org/87sex5gdqc.fsf%40localhost/
- https://lists.gnu.org/archive/html/info-gnu-emacs/2024-06/msg00000.html
- https://news.ycombinator.com/item?id=40768225
- https://www.openwall.com/lists/oss-security/2024/06/23/1
- https://www.openwall.com/lists/oss-security/2024/06/23/2
- https://lists.debian.org/debian-lts-announce/2024/06/msg00023.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00024.html
CVSS Scores
version 3.1