Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2012/01/10/2 | patch mailing list |
http://sourceforge.net/mailarchive/message.php?msg_id=28657612 | mailing list |
http://secunia.com/advisories/47311 | third party advisory vendor advisory |
http://secunia.com/advisories/50801 | third party advisory |
http://openwall.com/lists/oss-security/2012/01/10/4 | mailing list |
http://secunia.com/advisories/47515 | third party advisory vendor advisory |
http://sourceforge.net/mailarchive/message.php?msg_id=28649762 | mailing list |
http://www.ubuntu.com/usn/USN-1586-1 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:076 | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072285.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072288.html | vendor advisory |
https://security.gentoo.org/glsa/201812-05 | vendor advisory |
http://lists.gnu.org/archive/html/emacs-devel/2012-01/msg00387.html | patch mailing list |