Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2023-27985

Published: 9 March 2023

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
xemacs21
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
trusty Ignored
(end of standard support)
xenial Needs triage

bionic Needs triage

focal Needs triage

jammy Needs triage

upstream Ignored
(end of life)
lunar Needs triage

xemacs21-packages
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
jammy Needs triage

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needs triage

bionic Needs triage

focal Needs triage

lunar Needs triage

emacs
Launchpad, Ubuntu, Debian
focal Not vulnerable
(code not present)
jammy Not vulnerable
(code not present)
kinetic Not vulnerable
(code not present)
upstream Pending

trusty Ignored
(end of standard support)
xenial Ignored
(end of standard support)
bionic Does not exist

lunar Needed

Patches:
upstream: http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467
emacs24
Launchpad, Ubuntu, Debian
xenial Not vulnerable
(code not present)
trusty Ignored
(end of standard support)
bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

emacs25
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
trusty Does not exist

xenial Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

emacs23
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
xenial Does not exist

bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H