Bug 2345150 (CVE-2025-1244)

Summary: CVE-2025-1244 emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: seb
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2345158, 2345159    
Bug Blocks:    

Description OSIDB Bzimport 2025-02-12 07:32:27 UTC
A shell injection vulnerability exists in GNU Emacs due to improper handling of custom "man" URI schemes. Initially considered low severity, as it required user interaction with local files, it was later discovered that an attacker could exploit this vulnerability by tricking a user into visiting a specially crafted website or an HTTP URL with a redirect, leading to arbitrary shell command execution without further user action.This issue affects all released versions of GNU Emacs, including version 29.4.

Upstream patch:
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=820f0793f0b46448928905552726c1f1b999062f

Comment 6 errata-xmlrpc 2025-02-27 10:02:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:1915 https://access.redhat.com/errata/RHSA-2025:1915

Comment 7 errata-xmlrpc 2025-02-27 10:51:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:1917 https://access.redhat.com/errata/RHSA-2025:1917

Comment 8 errata-xmlrpc 2025-03-03 01:25:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:1961 https://access.redhat.com/errata/RHSA-2025:1961

Comment 9 errata-xmlrpc 2025-03-03 01:43:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:1963 https://access.redhat.com/errata/RHSA-2025:1963

Comment 10 errata-xmlrpc 2025-03-03 01:44:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:1962 https://access.redhat.com/errata/RHSA-2025:1962

Comment 11 errata-xmlrpc 2025-03-03 01:45:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:1964 https://access.redhat.com/errata/RHSA-2025:1964

Comment 12 errata-xmlrpc 2025-03-03 11:03:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:2022 https://access.redhat.com/errata/RHSA-2025:2022

Comment 13 errata-xmlrpc 2025-03-03 16:31:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:2130 https://access.redhat.com/errata/RHSA-2025:2130

Comment 14 errata-xmlrpc 2025-03-03 17:40:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:2157 https://access.redhat.com/errata/RHSA-2025:2157

Comment 15 errata-xmlrpc 2025-03-04 07:57:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:2195 https://access.redhat.com/errata/RHSA-2025:2195

Comment 16 seb 2025-04-03 22:18:51 UTC
This vulnerability was fixed in Emacs 30.1.

Do you plan to upgrade the version available in Fedora 40 and 41 to 30.1 ?
Or to backport the fix ?