Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2023-27986

Published: 9 March 2023

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
xemacs21
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
bionic Needs triage

focal Needs triage

jammy Needs triage

trusty Ignored
(end of standard support)
upstream Ignored
(end of life)
xenial Needs triage

lunar Needs triage

xemacs21-packages
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
trusty Ignored
(end of standard support)
xenial Needs triage

bionic Needs triage

focal Needs triage

jammy Needs triage

upstream Needs triage

lunar Needs triage

emacs
Launchpad, Ubuntu, Debian
focal Not vulnerable
(code not present)
jammy Not vulnerable
(code not present)
kinetic Not vulnerable
(code not present)
bionic Does not exist

trusty Ignored
(end of standard support)
upstream Pending

xenial Ignored
(end of standard support)
lunar Needed

Patches:
upstream: http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc
emacs24
Launchpad, Ubuntu, Debian
xenial Not vulnerable
(code not present)
trusty Ignored
(end of standard support)
bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

emacs25
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
trusty Does not exist

xenial Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

emacs23
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
xenial Does not exist

bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

upstream Needs triage

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H