FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
47e2e52c-975c-11e7-942d-5404a68a61a2emacs -- enriched text remote code execution vulnerability

Paul Eggert reports:

Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs.

When Emacs renders MIME text/enriched data (Internet RFC 1896), it is vulnerable to arbitrary code execution. Since Emacs-based mail clients decode "Content-Type: text/enriched", this code is exploitable remotely. This bug affects GNU Emacs versions 19.29 through 25.2.


Discovery 2017-09-04
Entry 2017-09-12
Modified 2017-09-13
emacs25
emacs-nox11
< 25.3,3

emacs-devel
< 26.0.50.20170912,2

http://seclists.org/oss-sec/2017/q3/422
https://bugs.gnu.org/28350
76e2fcce-92d2-11ed-a635-080027f5fec9emacs -- arbitary shell command execution vulnerability of ctags

lu4nx reports:

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.


Discovery 2022-11-28
Entry 2023-01-12
emacs
emacs-canna
emacs-nox
< 28.2_2,3

emacs-devel
emacs-devel-nox
< 30.0.50.202211128,2

CVE-2022-45939
https://nvd.nist.gov/vuln/detail/CVE-2022-45939