Headline
RHSA-2023:1931: Red Hat Security Advisory: emacs security update
An update for emacs is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
Synopsis
Important: emacs security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for emacs is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
- emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2180544 - CVE-2023-28617 emacs: command injection vulnerability in org-mode
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
x86_64
emacs-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f
emacs-common-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be
emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9
emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6
emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2
emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57
emacs-nox-26.1-7.el8_6.1.x86_64.rpm
SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7
emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
x86_64
emacs-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f
emacs-common-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be
emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9
emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6
emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2
emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57
emacs-nox-26.1-7.el8_6.1.x86_64.rpm
SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7
emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
s390x
emacs-26.1-7.el8_6.1.s390x.rpm
SHA-256: 716e9e05d48d8db598453428c740a65290cc6437f1e9bdbdff1f91c1c7eddc38
emacs-common-26.1-7.el8_6.1.s390x.rpm
SHA-256: 00b336436c4ee24238aae2ef87915d2847af0e23f7204a2eb9143ebd73ce3dde
emacs-common-debuginfo-26.1-7.el8_6.1.s390x.rpm
SHA-256: 10c7db49cdf2fcf2f2075d97595cdec0ac25c10869a3ebd9c2436bf6d4e63c44
emacs-debuginfo-26.1-7.el8_6.1.s390x.rpm
SHA-256: 70642aca0058341b39209e50bcec0de92c60dc9c2c94fa9145d1b49370bcfd6b
emacs-debugsource-26.1-7.el8_6.1.s390x.rpm
SHA-256: 1290a674ccb3cb548fb01eb5d86760966291e89a0ca15fd3ed90b28203d0c7a3
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.s390x.rpm
SHA-256: 7f5c32ad7a5ad50b03d8e5eb0066a7b8ac1d0429f6bc14e04ef8ed5f51f760cc
emacs-lucid-debuginfo-26.1-7.el8_6.1.s390x.rpm
SHA-256: 1b51192b2a87ad466bfa81cb6c4f9855a52f6d34c36d5e79fd03daf73e440294
emacs-nox-26.1-7.el8_6.1.s390x.rpm
SHA-256: 166550566ef9c03c0ceaf2adaee0399b0c0d5783799ddfc1e46cc4541d6bcdd9
emacs-nox-debuginfo-26.1-7.el8_6.1.s390x.rpm
SHA-256: 3b7b58700e8b3473c535f8e6dd20ef38d31e7302c8a7273b8fe1032c8abaea07
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
ppc64le
emacs-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 8372f7be12716c7e20edaacde46657974051d4603b0460ddb2f92e7acaf4da73
emacs-common-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: b9db1eb2ce08c488df3f5414c78c36ce51a28849444e1e95415bab57df0da62e
emacs-common-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 2b8dba8f83c1d153ffac5888ba41c007c2f3e66448a3158b3051a71701f04f33
emacs-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 561b6133ea18a44f6c9fe28c89e58187470c956bfe811e149fa9de901b521269
emacs-debugsource-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 1e5ae76d3deda43632b0d54fb67755c7ee4560c7dd1a85b21d345e80abac7c27
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 360a20d7105972bdcfb0f4132d450718eaf2b958ab1e8ab4b83fba9d2b7957bb
emacs-lucid-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 48eb01aa6e4e71ee8c01e94e89b2196016ad96ba64116e70588c6b35f9cc9f24
emacs-nox-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 5db11fe8bd7ecaf755de85406c108bd6e6ba39591a4eaee42c73cc8bcdbbfc59
emacs-nox-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 9f25df99f7490439e5ce00b3082b07b623302fb237b18624c2f285bb15b9eed0
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
x86_64
emacs-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f
emacs-common-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be
emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9
emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6
emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2
emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57
emacs-nox-26.1-7.el8_6.1.x86_64.rpm
SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7
emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
aarch64
emacs-26.1-7.el8_6.1.aarch64.rpm
SHA-256: 4ed5196cbad4efdba3eb1de39948ca7e8c2b781368f6167701f75e3eda9552d0
emacs-common-26.1-7.el8_6.1.aarch64.rpm
SHA-256: dd77cca85b7097bb32c3ebfbf3b758b974a5e98258eaffab8ee3cd09af5cd9e4
emacs-common-debuginfo-26.1-7.el8_6.1.aarch64.rpm
SHA-256: aee73c17670be3f113f805cecf3495ae06a01a85d7630c452365a66b3064159a
emacs-debuginfo-26.1-7.el8_6.1.aarch64.rpm
SHA-256: ec65d8498f2c5dce920cd7969abd9728b9deffa783995460a3de31ddd8b85d07
emacs-debugsource-26.1-7.el8_6.1.aarch64.rpm
SHA-256: e81c2602386a9ea56926b0101201e801605703249ca2beb23298ad911ad86039
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.aarch64.rpm
SHA-256: b462e341a62ea74e21e6db9b14d8ec6a178d67231155a4e8e695a66ce8415251
emacs-lucid-debuginfo-26.1-7.el8_6.1.aarch64.rpm
SHA-256: 74abd8770d6ce0442b37e5846fe0afdae818a28e5b2ba44c1d5a31dc2b0baafc
emacs-nox-26.1-7.el8_6.1.aarch64.rpm
SHA-256: 34e714a1cae8e8938950951be860d80ea54f23e325c725a4c9bfbb0b7b33e6ec
emacs-nox-debuginfo-26.1-7.el8_6.1.aarch64.rpm
SHA-256: 965c9b491a88aac0c2c9d336f90ef1ff8d123931651a37027887a6078ba427cf
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
ppc64le
emacs-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 8372f7be12716c7e20edaacde46657974051d4603b0460ddb2f92e7acaf4da73
emacs-common-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: b9db1eb2ce08c488df3f5414c78c36ce51a28849444e1e95415bab57df0da62e
emacs-common-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 2b8dba8f83c1d153ffac5888ba41c007c2f3e66448a3158b3051a71701f04f33
emacs-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 561b6133ea18a44f6c9fe28c89e58187470c956bfe811e149fa9de901b521269
emacs-debugsource-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 1e5ae76d3deda43632b0d54fb67755c7ee4560c7dd1a85b21d345e80abac7c27
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 360a20d7105972bdcfb0f4132d450718eaf2b958ab1e8ab4b83fba9d2b7957bb
emacs-lucid-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 48eb01aa6e4e71ee8c01e94e89b2196016ad96ba64116e70588c6b35f9cc9f24
emacs-nox-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 5db11fe8bd7ecaf755de85406c108bd6e6ba39591a4eaee42c73cc8bcdbbfc59
emacs-nox-debuginfo-26.1-7.el8_6.1.ppc64le.rpm
SHA-256: 9f25df99f7490439e5ce00b3082b07b623302fb237b18624c2f285bb15b9eed0
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
emacs-26.1-7.el8_6.1.src.rpm
SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82
x86_64
emacs-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f
emacs-common-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be
emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9
emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6
emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1
emacs-filesystem-26.1-7.el8_6.1.noarch.rpm
SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234
emacs-lucid-26.1-7.el8_6.1.x86_64.rpm
SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2
emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57
emacs-nox-26.1-7.el8_6.1.x86_64.rpm
SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7
emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm
SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6
emacs-terminal-26.1-7.el8_6.1.noarch.rpm
SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798
Related news
Ubuntu Security Notice 7027-1 - It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Red Hat Security Advisory 2023-3309-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.42. Issues addressed include a denial of service vulnerability.
An update for mtr-operator-bundle-container, mtr-operator-container, mtr-web-container, and mtr-web-executor-container is now available for Migration Toolkit for Runtimes 1 on RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-41854: Those using Sn...
Red Hat Security Advisory 2023-3189-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2023-2110-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.16. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-2626-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.
The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...
Red Hat Security Advisory 2023-2074-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
An update for emacs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
Red Hat Security Advisory 2023-1958-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
An update for emacs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
An update for emacs is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
Red Hat Security Advisory 2023-1931-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2023-1930-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2023-1915-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.
An update for emacs is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
Ubuntu Security Notice 6003-1 - Xi Lu discovered that Emacs did not properly handle certain inputs. An attacker could possibly use this issue to execute arbitrary commands.
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.