Skip to content

OSG-SEC-2023-04-26_2 MEDIUM GNU Emacs Org Mode arbitrary command injection

Dear OSG Security Contacts,

A vulnerability was identified in org-babel-execute:latex in ob-latex.el in Org Mode [1] through 9.6.1 for GNU Emacs. [2] It's unclear how widely this impacts OSG users, but all users of the GNU Emacs editor should install available updates for their OS as a precaution.

IMPACTED VERSIONS:

Org Mode versions 9.6.1 and prior.

WHAT ARE THE VULNERABILITIES:

The vulnerability allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

WHAT YOU SHOULD DO:

RHEL 8 & 9 based distributions Update the Emacs packages on your systems. [3]

RHEL 7 based distributions aren't impacted.

For Ubuntu see [4]

For other Debian distributions see [5]

REFERENCES

[1] https://orgmode.org/

[2] https://bugzilla.redhat.com/show_bug.cgi?id=2180544

[3] https://access.redhat.com/security/cve/CVE-2023-28617

[4] https://ubuntu.com/security/CVE-2023-28617

[5] https://security-tracker.debian.org/tracker/CVE-2023-28617

Please contact the OSG security team at [email protected] if you have any questions or concerns. OSG Security Team