Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Sep 2017 07:22:51 +0200
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: GNU Emacs 25.2 enriched text remote code execution

Hi

On Mon, Sep 11, 2017 at 08:58:57PM +0200, Salvatore Bonaccorso wrote:
> Hi Paul,
> 
> On Sun, Sep 10, 2017 at 11:56:20PM -0700, Paul Eggert wrote:
> > GNU Emacs is an extensible, customizable, free/libre text editor and
> > software environment.  When Emacs renders MIME text/enriched data (Internet
> > RFC 1896), it is vulnerable to arbitrary code execution. Since Emacs-based
> > mail clients decode "Content-Type: text/enriched", this code is exploitable
> > remotely. This bug affects GNU Emacs versions 19.29 through 25.2.
> > 
> > Although we know no efforts to exploit this in the wild, exploitation is easy.
> [...]
> > == Timeline ==
> > 
> > 2017-09-04. Bug reported to the Emacs bug tracker by Charles A. Roelli.
> > 
> > 2017-09-07. POC for remote code execution sent to the maintainers of Emacs
> > and Gnus (Reiner Steib <Reiner.Steib@....de>, private mail).
> > 
> > 2017-09-08. Patch (by Lars Ingebrigtsen <larsi@...s.org>) to disable the
> > problematic code and mitigation (private mail).
> > 
> > 2017-09-09. Patch committed in main development repository.
> 
> Have you requested a CVE for this issue?

FTR, it seems this was submitted to DWF already as per:
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350#63

Regards,
Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.