A shell injection vulnerability exists in GNU Emacs due to improper handling of custom "man" URI schemes. Initially considered low severity, as it required user interaction with local files, it was later discovered that an attacker could exploit this vulnerability by tricking a user into visiting a specially crafted website or an HTTP URL with a redirect, leading to arbitrary shell command execution without further user action.This issue affects all released versions of GNU Emacs, including version 29.4. Upstream patch: https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=820f0793f0b46448928905552726c1f1b999062f
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:1915 https://access.redhat.com/errata/RHSA-2025:1915
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:1917 https://access.redhat.com/errata/RHSA-2025:1917
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:1961 https://access.redhat.com/errata/RHSA-2025:1961
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:1963 https://access.redhat.com/errata/RHSA-2025:1963
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:1962 https://access.redhat.com/errata/RHSA-2025:1962
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:1964 https://access.redhat.com/errata/RHSA-2025:1964
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:2022 https://access.redhat.com/errata/RHSA-2025:2022
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:2130 https://access.redhat.com/errata/RHSA-2025:2130
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:2157 https://access.redhat.com/errata/RHSA-2025:2157
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:2195 https://access.redhat.com/errata/RHSA-2025:2195
This vulnerability was fixed in Emacs 30.1. Do you plan to upgrade the version available in Fedora 40 and 41 to 30.1 ? Or to backport the fix ?