Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1931: Red Hat Security Advisory: emacs security update

An update for emacs is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.
Red Hat Security Data
#vulnerability#mac#linux#red_hat#ibm#sap

Synopsis

Important: emacs security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for emacs is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.

Security Fix(es):

  • emacs: command injection vulnerability in org-mode (CVE-2023-28617)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2180544 - CVE-2023-28617 emacs: command injection vulnerability in org-mode

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

x86_64

emacs-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f

emacs-common-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be

emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9

emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6

emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2

emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57

emacs-nox-26.1-7.el8_6.1.x86_64.rpm

SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7

emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

x86_64

emacs-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f

emacs-common-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be

emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9

emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6

emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2

emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57

emacs-nox-26.1-7.el8_6.1.x86_64.rpm

SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7

emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

s390x

emacs-26.1-7.el8_6.1.s390x.rpm

SHA-256: 716e9e05d48d8db598453428c740a65290cc6437f1e9bdbdff1f91c1c7eddc38

emacs-common-26.1-7.el8_6.1.s390x.rpm

SHA-256: 00b336436c4ee24238aae2ef87915d2847af0e23f7204a2eb9143ebd73ce3dde

emacs-common-debuginfo-26.1-7.el8_6.1.s390x.rpm

SHA-256: 10c7db49cdf2fcf2f2075d97595cdec0ac25c10869a3ebd9c2436bf6d4e63c44

emacs-debuginfo-26.1-7.el8_6.1.s390x.rpm

SHA-256: 70642aca0058341b39209e50bcec0de92c60dc9c2c94fa9145d1b49370bcfd6b

emacs-debugsource-26.1-7.el8_6.1.s390x.rpm

SHA-256: 1290a674ccb3cb548fb01eb5d86760966291e89a0ca15fd3ed90b28203d0c7a3

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.s390x.rpm

SHA-256: 7f5c32ad7a5ad50b03d8e5eb0066a7b8ac1d0429f6bc14e04ef8ed5f51f760cc

emacs-lucid-debuginfo-26.1-7.el8_6.1.s390x.rpm

SHA-256: 1b51192b2a87ad466bfa81cb6c4f9855a52f6d34c36d5e79fd03daf73e440294

emacs-nox-26.1-7.el8_6.1.s390x.rpm

SHA-256: 166550566ef9c03c0ceaf2adaee0399b0c0d5783799ddfc1e46cc4541d6bcdd9

emacs-nox-debuginfo-26.1-7.el8_6.1.s390x.rpm

SHA-256: 3b7b58700e8b3473c535f8e6dd20ef38d31e7302c8a7273b8fe1032c8abaea07

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

ppc64le

emacs-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 8372f7be12716c7e20edaacde46657974051d4603b0460ddb2f92e7acaf4da73

emacs-common-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: b9db1eb2ce08c488df3f5414c78c36ce51a28849444e1e95415bab57df0da62e

emacs-common-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 2b8dba8f83c1d153ffac5888ba41c007c2f3e66448a3158b3051a71701f04f33

emacs-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 561b6133ea18a44f6c9fe28c89e58187470c956bfe811e149fa9de901b521269

emacs-debugsource-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 1e5ae76d3deda43632b0d54fb67755c7ee4560c7dd1a85b21d345e80abac7c27

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 360a20d7105972bdcfb0f4132d450718eaf2b958ab1e8ab4b83fba9d2b7957bb

emacs-lucid-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 48eb01aa6e4e71ee8c01e94e89b2196016ad96ba64116e70588c6b35f9cc9f24

emacs-nox-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 5db11fe8bd7ecaf755de85406c108bd6e6ba39591a4eaee42c73cc8bcdbbfc59

emacs-nox-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 9f25df99f7490439e5ce00b3082b07b623302fb237b18624c2f285bb15b9eed0

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

x86_64

emacs-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f

emacs-common-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be

emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9

emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6

emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2

emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57

emacs-nox-26.1-7.el8_6.1.x86_64.rpm

SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7

emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

aarch64

emacs-26.1-7.el8_6.1.aarch64.rpm

SHA-256: 4ed5196cbad4efdba3eb1de39948ca7e8c2b781368f6167701f75e3eda9552d0

emacs-common-26.1-7.el8_6.1.aarch64.rpm

SHA-256: dd77cca85b7097bb32c3ebfbf3b758b974a5e98258eaffab8ee3cd09af5cd9e4

emacs-common-debuginfo-26.1-7.el8_6.1.aarch64.rpm

SHA-256: aee73c17670be3f113f805cecf3495ae06a01a85d7630c452365a66b3064159a

emacs-debuginfo-26.1-7.el8_6.1.aarch64.rpm

SHA-256: ec65d8498f2c5dce920cd7969abd9728b9deffa783995460a3de31ddd8b85d07

emacs-debugsource-26.1-7.el8_6.1.aarch64.rpm

SHA-256: e81c2602386a9ea56926b0101201e801605703249ca2beb23298ad911ad86039

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.aarch64.rpm

SHA-256: b462e341a62ea74e21e6db9b14d8ec6a178d67231155a4e8e695a66ce8415251

emacs-lucid-debuginfo-26.1-7.el8_6.1.aarch64.rpm

SHA-256: 74abd8770d6ce0442b37e5846fe0afdae818a28e5b2ba44c1d5a31dc2b0baafc

emacs-nox-26.1-7.el8_6.1.aarch64.rpm

SHA-256: 34e714a1cae8e8938950951be860d80ea54f23e325c725a4c9bfbb0b7b33e6ec

emacs-nox-debuginfo-26.1-7.el8_6.1.aarch64.rpm

SHA-256: 965c9b491a88aac0c2c9d336f90ef1ff8d123931651a37027887a6078ba427cf

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

ppc64le

emacs-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 8372f7be12716c7e20edaacde46657974051d4603b0460ddb2f92e7acaf4da73

emacs-common-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: b9db1eb2ce08c488df3f5414c78c36ce51a28849444e1e95415bab57df0da62e

emacs-common-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 2b8dba8f83c1d153ffac5888ba41c007c2f3e66448a3158b3051a71701f04f33

emacs-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 561b6133ea18a44f6c9fe28c89e58187470c956bfe811e149fa9de901b521269

emacs-debugsource-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 1e5ae76d3deda43632b0d54fb67755c7ee4560c7dd1a85b21d345e80abac7c27

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 360a20d7105972bdcfb0f4132d450718eaf2b958ab1e8ab4b83fba9d2b7957bb

emacs-lucid-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 48eb01aa6e4e71ee8c01e94e89b2196016ad96ba64116e70588c6b35f9cc9f24

emacs-nox-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 5db11fe8bd7ecaf755de85406c108bd6e6ba39591a4eaee42c73cc8bcdbbfc59

emacs-nox-debuginfo-26.1-7.el8_6.1.ppc64le.rpm

SHA-256: 9f25df99f7490439e5ce00b3082b07b623302fb237b18624c2f285bb15b9eed0

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

emacs-26.1-7.el8_6.1.src.rpm

SHA-256: e5da361ddfa7871d1760d3b43a8312e5c897c3c4e9b0d8b60758f6a60305bb82

x86_64

emacs-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 34a937a8a0eef819f5fe9c46395babec6457c8fcd14b2cde40645238bae0f98f

emacs-common-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 6702639b0fbfc32d6a40c929db0794f6d3c2a0b7f92a73f056f12e8b6eadf3be

emacs-common-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 78b65bb1a4c61818b6999448da6a4c0f747cad72a19923c55f1bdb8e641667f9

emacs-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f42c2f86db4254f2e61f4a37c751a2a4e2134c767ca2a66a684935985af552a6

emacs-debugsource-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 30d8797338cf7aec04becb284bd3e89dca79d4b298a9357cd845c266ea7818a1

emacs-filesystem-26.1-7.el8_6.1.noarch.rpm

SHA-256: 78df996b4e7b58614d5a1fd20dc0c201aa51a832b3c5caed7eada19d03c9a234

emacs-lucid-26.1-7.el8_6.1.x86_64.rpm

SHA-256: f6156735567242e05c3caddc9ac39da9751006703aa7ff947a91a1480d0374b2

emacs-lucid-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: eafff461f45d558d67d3430a5c8bfddab0df249913b03578c3b736aba9f3ba57

emacs-nox-26.1-7.el8_6.1.x86_64.rpm

SHA-256: c084b8a4d94b00ec982015d12e15862ad8353a79489b227f62bdd148899303f7

emacs-nox-debuginfo-26.1-7.el8_6.1.x86_64.rpm

SHA-256: 988ce00efdba79f3aa275430449898e67b16d355490bf574504457adedd1f8c6

emacs-terminal-26.1-7.el8_6.1.noarch.rpm

SHA-256: 82e9bd5569ff72158ddc3597d7c411ec6c8beaeb544431a3be3221d3e7660798

Related news

Red Hat Security Advisory 2023-3309-01

Red Hat Security Advisory 2023-3309-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.42. Issues addressed include a denial of service vulnerability.

RHSA-2023:3373: Red Hat Security Advisory: Migration Toolkit for Runtimes security update

An update for mtr-operator-bundle-container, mtr-operator-container, mtr-web-container, and mtr-web-executor-container is now available for Migration Toolkit for Runtimes 1 on RHEL 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-41854: Those using Sn...

Red Hat Security Advisory 2023-3189-01

Red Hat Security Advisory 2023-3189-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-2110-01

Red Hat Security Advisory 2023-2110-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.16. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-2626-01

Red Hat Security Advisory 2023-2626-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-2107-01

Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.

RHSA-2023:2107: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...

Red Hat Security Advisory 2023-2074-01

Red Hat Security Advisory 2023-2074-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

RHSA-2023:2074: Red Hat Security Advisory: emacs security update

An update for emacs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.

Red Hat Security Advisory 2023-1958-01

Red Hat Security Advisory 2023-1958-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

RHSA-2023:2010: Red Hat Security Advisory: emacs security update

An update for emacs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.

RHSA-2023:1958: Red Hat Security Advisory: emacs security update

An update for emacs is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.

Red Hat Security Advisory 2023-1931-01

Red Hat Security Advisory 2023-1931-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-1930-01

Red Hat Security Advisory 2023-1930-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-1915-01

Red Hat Security Advisory 2023-1915-01 - GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language, and the capability to read e-mail and news. Issues addressed include a code execution vulnerability.

RHSA-2023:1915: Red Hat Security Advisory: emacs security update

An update for emacs is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28617: A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution.

Ubuntu Security Notice USN-6003-1

Ubuntu Security Notice 6003-1 - Xi Lu discovered that Emacs did not properly handle certain inputs. An attacker could possibly use this issue to execute arbitrary commands.

CVE-2023-28617: [PATCH] Fix ob-latex.el command injection vulnerability.

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.