Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-48338 (GCVE-0-2022-48338)
Vulnerability from cvelistv5 – Published: 2023-02-20 00:00 – Updated: 2025-03-18 15:21- n/a
| URL | Tags |
|---|---|
| https://git.savannah.gnu.org/cgit/emacs.git/commi… | |
| https://www.debian.org/security/2023/dsa-5360 | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:10:59.720Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"name": "DSA-5360",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5360"
},
{
"name": "FEDORA-2023-5763445abe",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"name": "FEDORA-2023-29df561f1d",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-48338",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T15:21:17.361535Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T15:21:22.243Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-14T02:06:10.519Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"name": "DSA-5360",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5360"
},
{
"name": "FEDORA-2023-5763445abe",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"name": "FEDORA-2023-29df561f1d",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-48338",
"datePublished": "2023-02-20T00:00:00.000Z",
"dateReserved": "2023-02-20T00:00:00.000Z",
"dateUpdated": "2025-03-18T15:21:22.243Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-48338",
"date": "2026-05-21",
"epss": "0.00142",
"percentile": "0.33851"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"28.2\", \"matchCriteriaId\": \"8E37D947-CF14-442A-B26B-3C570DB9D5E1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.\"}]",
"id": "CVE-2022-48338",
"lastModified": "2024-11-21T07:33:12.090",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}]}",
"published": "2023-02-20T23:15:12.297",
"references": "[{\"url\": \"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5360\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5360\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-77\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-48338\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-02-20T23:15:12.297\",\"lastModified\":\"2025-03-18T16:15:14.863\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"28.2\",\"matchCriteriaId\":\"8E37D947-CF14-442A-B26B-3C570DB9D5E1\"}]}]}],\"references\":[{\"url\":\"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5360\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5360\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5360\", \"name\": \"DSA-5360\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\", \"name\": \"FEDORA-2023-5763445abe\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\", \"name\": \"FEDORA-2023-29df561f1d\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:10:59.720Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48338\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-18T15:21:17.361535Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-18T15:21:10.815Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5360\", \"name\": \"DSA-5360\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\", \"name\": \"FEDORA-2023-5763445abe\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\", \"name\": \"FEDORA-2023-29df561f1d\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-10-14T02:06:10.519Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48338\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-18T15:21:22.243Z\", \"dateReserved\": \"2023-02-20T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-02-20T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
alsa-2023:2626
Vulnerability from osv_almalinux
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
- emacs: Regression of CVE-2023-28617 fixes in the AlmaLinux (CVE-2023-2491)
- emacs: command execution via shell metacharacters (CVE-2022-48337)
- emacs: local command injection in ruby-mode.el (CVE-2022-48338)
- emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "emacs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:27.2-8.el9_2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "emacs-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:27.2-8.el9_2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "emacs-filesystem"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:27.2-8.el9_2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "emacs-lucid"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:27.2-8.el9_2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "emacs-nox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:27.2-8.el9_2.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the AlmaLinux (CVE-2023-2491)\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:2626",
"modified": "2023-05-11T22:55:28Z",
"published": "2023-05-09T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48337"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48338"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48339"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-2491"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2171987"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2171988"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2171989"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2192873"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-2626.html"
}
],
"related": [
"CVE-2023-28617",
"CVE-2023-2491",
"CVE-2022-48337",
"CVE-2022-48338",
"CVE-2022-48339"
],
"summary": "Important: emacs security update"
}
BDU:2024-06035
Vulnerability from fstec - Published: 20.02.2023{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Fedora Project, The GNU Project",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 9 (Red Hat Enterprise Linux), 37 (Fedora), 38 (Fedora), \u0434\u043e 28.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (EMACS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f emacs:\nhttps://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-48338\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\t\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2022-48338",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.02.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "07.08.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "07.08.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06035",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-48338",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Fedora, EMACS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Red Hat Inc. Red Hat Enterprise Linux 9 , Fedora Project Fedora 37 , Fedora Project Fedora 38 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ruby-find-library-file \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0433\u043e \u0440\u0435\u0434\u0430\u043a\u0442\u043e\u0440\u0430 EMACS, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0435, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0447\u0438\u0441\u0442\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u043c \u0443\u0440\u043e\u0432\u043d\u0435 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443) (CWE-77)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ruby-find-library-file \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0433\u043e \u0440\u0435\u0434\u0430\u043a\u0442\u043e\u0440\u0430 EMACS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c\nhttps://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2022-48338\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/\t\nhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/\nhttps://access.redhat.com/security/cve/CVE-2022-48338",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-77",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,3)"
}
FKIE_CVE-2022-48338
Vulnerability from fkie_nvd - Published: 2023-02-20 23:15 - Updated: 2025-03-18 16:157.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c | Patch | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/ | ||
| cve@mitre.org | https://www.debian.org/security/2023/dsa-5360 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5360 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E37D947-CF14-442A-B26B-3C570DB9D5E1",
"versionEndIncluding": "28.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed."
}
],
"id": "CVE-2022-48338",
"lastModified": "2025-03-18T16:15:14.863",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-02-20T23:15:12.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5360"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5360"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-HM6M-2XG8-MC5Q
Vulnerability from github – Published: 2023-02-21 00:30 – Updated: 2025-03-18 18:30An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
{
"affected": [],
"aliases": [
"CVE-2022-48338"
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-20T23:15:00Z",
"severity": "CRITICAL"
},
"details": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.",
"id": "GHSA-hm6m-2xg8-mc5q",
"modified": "2025-03-18T18:30:37Z",
"published": "2023-02-21T00:30:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
},
{
"type": "WEB",
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5360"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-48338
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-48338",
"description": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.",
"id": "GSD-2022-48338",
"references": [
"https://www.debian.org/security/2023/dsa-5360",
"https://advisories.mageia.org/CVE-2022-48338.html",
"https://www.suse.com/security/cve/CVE-2022-48338.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-48338"
],
"details": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.",
"id": "GSD-2022-48338",
"modified": "2023-12-13T01:19:26.067903Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-48338",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c",
"refsource": "MISC",
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"name": "DSA-5360",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2023/dsa-5360"
},
{
"name": "FEDORA-2023-5763445abe",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"name": "FEDORA-2023-29df561f1d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "28.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-48338"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c"
},
{
"name": "DSA-5360",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5360"
},
{
"name": "FEDORA-2023-5763445abe",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/"
},
{
"name": "FEDORA-2023-29df561f1d",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-10-14T03:15Z",
"publishedDate": "2023-02-20T23:15Z"
}
}
}
MSRC_CVE-2022-48338
Vulnerability from csaf_microsoft - Published: 2023-02-01 00:00 - Updated: 2023-03-22 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 18397-17086 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-1 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48338 An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function and bound to C-c C-f. Inside the function the external command gem is called through shell-command-to-string but the feature-name parameters are not escaped. Thus malicious Ruby source files may cause commands to be executed. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-48338.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function and bound to C-c C-f. Inside the function the external command gem is called through shell-command-to-string but the feature-name parameters are not escaped. Thus malicious Ruby source files may cause commands to be executed.",
"tracking": {
"current_release_date": "2023-03-22T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:15:36.640Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-48338",
"initial_release_date": "2023-02-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-02-27T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2023-03-22T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 emacs 28.2-4",
"product": {
"name": "\u003ccbl2 emacs 28.2-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 emacs 28.2-4",
"product": {
"name": "cbl2 emacs 28.2-4",
"product_id": "18397"
}
}
],
"category": "product_name",
"name": "emacs"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 emacs 28.2-4 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 emacs 28.2-4 as a component of CBL Mariner 2.0",
"product_id": "18397-17086"
},
"product_reference": "18397",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48338",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18397-17086"
],
"known_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48338 An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function and bound to C-c C-f. Inside the function the external command gem is called through shell-command-to-string but the feature-name parameters are not escaped. Thus malicious Ruby source files may cause commands to be executed. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-48338.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-27T00:00:00.000Z",
"details": "28.2-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-1"
]
}
],
"title": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function and bound to C-c C-f. Inside the function the external command gem is called through shell-command-to-string but the feature-name parameters are not escaped. Thus malicious Ruby source files may cause commands to be executed."
}
]
}
OPENSUSE-SU-2024:12721-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:etags-28.2-2.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2022-48337/ | self |
| https://www.suse.com/security/cve/CVE-2022-48338/ | self |
| https://www.suse.com/security/cve/CVE-2022-48339/ | self |
| https://www.suse.com/security/cve/CVE-2022-48337 | external |
| https://bugzilla.suse.com/1208515 | external |
| https://bugzilla.suse.com/1211499 | external |
| https://bugzilla.suse.com/1211512 | external |
| https://bugzilla.suse.com/1213840 | external |
| https://www.suse.com/security/cve/CVE-2022-48338 | external |
| https://bugzilla.suse.com/1208514 | external |
| https://www.suse.com/security/cve/CVE-2022-48339 | external |
| https://bugzilla.suse.com/1208512 | external |
| https://bugzilla.suse.com/1211512 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "emacs-28.2-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the emacs-28.2-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12721",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12721-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48337 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48338 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48339 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48339/"
}
],
"title": "emacs-28.2-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12721-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "emacs-28.2-2.1.aarch64",
"product": {
"name": "emacs-28.2-2.1.aarch64",
"product_id": "emacs-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-el-28.2-2.1.aarch64",
"product": {
"name": "emacs-el-28.2-2.1.aarch64",
"product_id": "emacs-el-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-eln-28.2-2.1.aarch64",
"product": {
"name": "emacs-eln-28.2-2.1.aarch64",
"product_id": "emacs-eln-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-info-28.2-2.1.aarch64",
"product": {
"name": "emacs-info-28.2-2.1.aarch64",
"product_id": "emacs-info-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-nox-28.2-2.1.aarch64",
"product": {
"name": "emacs-nox-28.2-2.1.aarch64",
"product_id": "emacs-nox-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-x11-28.2-2.1.aarch64",
"product": {
"name": "emacs-x11-28.2-2.1.aarch64",
"product_id": "emacs-x11-28.2-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "etags-28.2-2.1.aarch64",
"product": {
"name": "etags-28.2-2.1.aarch64",
"product_id": "etags-28.2-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-28.2-2.1.ppc64le",
"product": {
"name": "emacs-28.2-2.1.ppc64le",
"product_id": "emacs-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-el-28.2-2.1.ppc64le",
"product": {
"name": "emacs-el-28.2-2.1.ppc64le",
"product_id": "emacs-el-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-eln-28.2-2.1.ppc64le",
"product": {
"name": "emacs-eln-28.2-2.1.ppc64le",
"product_id": "emacs-eln-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-info-28.2-2.1.ppc64le",
"product": {
"name": "emacs-info-28.2-2.1.ppc64le",
"product_id": "emacs-info-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-nox-28.2-2.1.ppc64le",
"product": {
"name": "emacs-nox-28.2-2.1.ppc64le",
"product_id": "emacs-nox-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-x11-28.2-2.1.ppc64le",
"product": {
"name": "emacs-x11-28.2-2.1.ppc64le",
"product_id": "emacs-x11-28.2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "etags-28.2-2.1.ppc64le",
"product": {
"name": "etags-28.2-2.1.ppc64le",
"product_id": "etags-28.2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-28.2-2.1.s390x",
"product": {
"name": "emacs-28.2-2.1.s390x",
"product_id": "emacs-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-el-28.2-2.1.s390x",
"product": {
"name": "emacs-el-28.2-2.1.s390x",
"product_id": "emacs-el-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-eln-28.2-2.1.s390x",
"product": {
"name": "emacs-eln-28.2-2.1.s390x",
"product_id": "emacs-eln-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-info-28.2-2.1.s390x",
"product": {
"name": "emacs-info-28.2-2.1.s390x",
"product_id": "emacs-info-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-nox-28.2-2.1.s390x",
"product": {
"name": "emacs-nox-28.2-2.1.s390x",
"product_id": "emacs-nox-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-x11-28.2-2.1.s390x",
"product": {
"name": "emacs-x11-28.2-2.1.s390x",
"product_id": "emacs-x11-28.2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "etags-28.2-2.1.s390x",
"product": {
"name": "etags-28.2-2.1.s390x",
"product_id": "etags-28.2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-28.2-2.1.x86_64",
"product": {
"name": "emacs-28.2-2.1.x86_64",
"product_id": "emacs-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-el-28.2-2.1.x86_64",
"product": {
"name": "emacs-el-28.2-2.1.x86_64",
"product_id": "emacs-el-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-eln-28.2-2.1.x86_64",
"product": {
"name": "emacs-eln-28.2-2.1.x86_64",
"product_id": "emacs-eln-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-info-28.2-2.1.x86_64",
"product": {
"name": "emacs-info-28.2-2.1.x86_64",
"product_id": "emacs-info-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-nox-28.2-2.1.x86_64",
"product": {
"name": "emacs-nox-28.2-2.1.x86_64",
"product_id": "emacs-nox-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-x11-28.2-2.1.x86_64",
"product": {
"name": "emacs-x11-28.2-2.1.x86_64",
"product_id": "emacs-x11-28.2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "etags-28.2-2.1.x86_64",
"product": {
"name": "etags-28.2-2.1.x86_64",
"product_id": "etags-28.2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-28.2-2.1.aarch64"
},
"product_reference": "emacs-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le"
},
"product_reference": "emacs-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-28.2-2.1.s390x"
},
"product_reference": "emacs-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-28.2-2.1.x86_64"
},
"product_reference": "emacs-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64"
},
"product_reference": "emacs-el-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le"
},
"product_reference": "emacs-el-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x"
},
"product_reference": "emacs-el-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64"
},
"product_reference": "emacs-el-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-eln-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64"
},
"product_reference": "emacs-eln-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-eln-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le"
},
"product_reference": "emacs-eln-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-eln-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x"
},
"product_reference": "emacs-eln-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-eln-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64"
},
"product_reference": "emacs-eln-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64"
},
"product_reference": "emacs-info-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le"
},
"product_reference": "emacs-info-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x"
},
"product_reference": "emacs-info-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64"
},
"product_reference": "emacs-info-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64"
},
"product_reference": "emacs-nox-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le"
},
"product_reference": "emacs-nox-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x"
},
"product_reference": "emacs-nox-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64"
},
"product_reference": "emacs-nox-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64"
},
"product_reference": "emacs-x11-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le"
},
"product_reference": "emacs-x11-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x"
},
"product_reference": "emacs-x11-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64"
},
"product_reference": "emacs-x11-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-28.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:etags-28.2-2.1.aarch64"
},
"product_reference": "etags-28.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-28.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:etags-28.2-2.1.ppc64le"
},
"product_reference": "etags-28.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-28.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:etags-28.2-2.1.s390x"
},
"product_reference": "etags-28.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-28.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
},
"product_reference": "etags-28.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48337"
}
],
"notes": [
{
"category": "general",
"text": "GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the \"etags -u *\" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48337",
"url": "https://www.suse.com/security/cve/CVE-2022-48337"
},
{
"category": "external",
"summary": "SUSE Bug 1208515 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1208515"
},
{
"category": "external",
"summary": "SUSE Bug 1211499 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1211499"
},
{
"category": "external",
"summary": "SUSE Bug 1211512 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1211512"
},
{
"category": "external",
"summary": "SUSE Bug 1213840 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1213840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48338"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48338",
"url": "https://www.suse.com/security/cve/CVE-2022-48338"
},
{
"category": "external",
"summary": "SUSE Bug 1208514 for CVE-2022-48338",
"url": "https://bugzilla.suse.com/1208514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-48338"
},
{
"cve": "CVE-2022-48339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48339"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48339",
"url": "https://www.suse.com/security/cve/CVE-2022-48339"
},
{
"category": "external",
"summary": "SUSE Bug 1208512 for CVE-2022-48339",
"url": "https://bugzilla.suse.com/1208512"
},
{
"category": "external",
"summary": "SUSE Bug 1211512 for CVE-2022-48339",
"url": "https://bugzilla.suse.com/1211512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:emacs-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-el-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-eln-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-info-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-nox-28.2-2.1.x86_64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.aarch64",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.s390x",
"openSUSE Tumbleweed:emacs-x11-28.2-2.1.x86_64",
"openSUSE Tumbleweed:etags-28.2-2.1.aarch64",
"openSUSE Tumbleweed:etags-28.2-2.1.ppc64le",
"openSUSE Tumbleweed:etags-28.2-2.1.s390x",
"openSUSE Tumbleweed:etags-28.2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-48339"
}
]
}
RHSA-2023:2626
Vulnerability from csaf_redhat - Published: 2023-05-09 11:16 - Updated: 2026-01-21 19:24A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:2626 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171987 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171988 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171989 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2022-48337 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171987 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48337 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48337 | external |
| https://access.redhat.com/security/cve/CVE-2022-48338 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171988 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48338 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48338 | external |
| https://access.redhat.com/security/cve/CVE-2022-48339 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171989 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48339 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48339 | external |
| https://access.redhat.com/security/cve/CVE-2023-2491 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-2491 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-2491 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for emacs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2626",
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2171987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
},
{
"category": "external",
"summary": "2171988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
},
{
"category": "external",
"summary": "2171989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
},
{
"category": "external",
"summary": "2192873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2626.json"
}
],
"title": "Red Hat Security Advisory: emacs security update",
"tracking": {
"current_release_date": "2026-01-21T19:24:38+00:00",
"generator": {
"date": "2026-01-21T19:24:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:2626",
"initial_release_date": "2023-05-09T11:16:54+00:00",
"revision_history": [
{
"date": "2023-05-09T11:16:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T11:16:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-21T19:24:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.src",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.src",
"product_id": "emacs-1:27.2-8.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product": {
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product_id": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch"
},
"product_reference": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48337",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: command execution via shell metacharacters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48337"
},
{
"category": "external",
"summary": "RHBZ#2171987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: command execution via shell metacharacters"
},
{
"cve": "CVE-2022-48338",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: local command injection in ruby-mode.el",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user runs Emacs with untrusted input. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48338"
},
{
"category": "external",
"summary": "RHBZ#2171988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48338",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: local command injection in ruby-mode.el"
},
{
"cve": "CVE-2022-48339",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: command injection vulnerability in htmlfontify.el",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file or directory with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48339"
},
{
"category": "external",
"summary": "RHBZ#2171989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: command injection vulnerability in htmlfontify.el"
},
{
"cve": "CVE-2023-2491",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-05-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2192873"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2491"
},
{
"category": "external",
"summary": "RHBZ#2192873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
}
],
"release_date": "2023-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
}
]
}
RHSA-2023_2626
Vulnerability from csaf_redhat - Published: 2023-05-09 11:16 - Updated: 2024-11-22 22:39A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:2626 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171987 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171988 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171989 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2022-48337 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171987 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48337 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48337 | external |
| https://access.redhat.com/security/cve/CVE-2022-48338 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171988 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48338 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48338 | external |
| https://access.redhat.com/security/cve/CVE-2022-48339 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2171989 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-48339 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-48339 | external |
| https://access.redhat.com/security/cve/CVE-2023-2491 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-2491 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-2491 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for emacs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2626",
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2171987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
},
{
"category": "external",
"summary": "2171988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
},
{
"category": "external",
"summary": "2171989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
},
{
"category": "external",
"summary": "2192873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2626.json"
}
],
"title": "Red Hat Security Advisory: emacs security update",
"tracking": {
"current_release_date": "2024-11-22T22:39:49+00:00",
"generator": {
"date": "2024-11-22T22:39:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:2626",
"initial_release_date": "2023-05-09T11:16:54+00:00",
"revision_history": [
{
"date": "2023-05-09T11:16:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T11:16:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:39:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.src",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.src",
"product_id": "emacs-1:27.2-8.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-common-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product": {
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product_id": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-common-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch"
},
"product_reference": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
},
"product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48337",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: command execution via shell metacharacters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48337"
},
{
"category": "external",
"summary": "RHBZ#2171987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: command execution via shell metacharacters"
},
{
"cve": "CVE-2022-48338",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: local command injection in ruby-mode.el",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user runs Emacs with untrusted input. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48338"
},
{
"category": "external",
"summary": "RHBZ#2171988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48338",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: local command injection in ruby-mode.el"
},
{
"cve": "CVE-2022-48339",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2171989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: command injection vulnerability in htmlfontify.el",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file or directory with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48339"
},
{
"category": "external",
"summary": "RHBZ#2171989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339"
}
],
"release_date": "2023-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "emacs: command injection vulnerability in htmlfontify.el"
},
{
"cve": "CVE-2023-2491",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2023-05-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2192873"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2491"
},
{
"category": "external",
"summary": "RHBZ#2192873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
}
],
"release_date": "2023-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T11:16:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
}
]
}
SUSE-SU-2023:0598-1
Vulnerability from csaf_suse - Published: 2023-03-02 11:23 - Updated: 2023-03-02 11:23| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/s… | self |
| https://www.suse.com/support/update/announcement/… | self |
| https://lists.suse.com/pipermail/sle-security-upd… | self |
| https://bugzilla.suse.com/1208512 | self |
| https://bugzilla.suse.com/1208514 | self |
| https://bugzilla.suse.com/1208515 | self |
| https://www.suse.com/security/cve/CVE-2022-48337/ | self |
| https://www.suse.com/security/cve/CVE-2022-48338/ | self |
| https://www.suse.com/security/cve/CVE-2022-48339/ | self |
| https://www.suse.com/security/cve/CVE-2022-48337 | external |
| https://bugzilla.suse.com/1208515 | external |
| https://bugzilla.suse.com/1211499 | external |
| https://bugzilla.suse.com/1211512 | external |
| https://bugzilla.suse.com/1213840 | external |
| https://www.suse.com/security/cve/CVE-2022-48338 | external |
| https://bugzilla.suse.com/1208514 | external |
| https://www.suse.com/security/cve/CVE-2022-48339 | external |
| https://bugzilla.suse.com/1208512 | external |
| https://bugzilla.suse.com/1211512 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for emacs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for emacs fixes the following issues:\n\n - CVE-2022-48337: Fixed etags local command injection vulnerability (bsc#1208515).\n - CVE-2022-48339: Fixed htmlfontify.el command injection vulnerability (bsc#1208512).\n - CVE-2022-48338: Fixed ruby-mode.el local command injection vulnerability (bsc#1208514).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-598,SUSE-SLE-Module-Basesystem-15-SP4-2023-598,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-598,openSUSE-SLE-15.4-2023-598",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0598-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0598-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230598-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0598-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013956.html"
},
{
"category": "self",
"summary": "SUSE Bug 1208512",
"url": "https://bugzilla.suse.com/1208512"
},
{
"category": "self",
"summary": "SUSE Bug 1208514",
"url": "https://bugzilla.suse.com/1208514"
},
{
"category": "self",
"summary": "SUSE Bug 1208515",
"url": "https://bugzilla.suse.com/1208515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48337 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48338 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48339 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48339/"
}
],
"title": "Security update for emacs",
"tracking": {
"current_release_date": "2023-03-02T11:23:58Z",
"generator": {
"date": "2023-03-02T11:23:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0598-1",
"initial_release_date": "2023-03-02T11:23:58Z",
"revision_history": [
{
"date": "2023-03-02T11:23:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "emacs-27.2-150400.3.6.1.aarch64",
"product": {
"name": "emacs-27.2-150400.3.6.1.aarch64",
"product_id": "emacs-27.2-150400.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-nox-27.2-150400.3.6.1.aarch64",
"product": {
"name": "emacs-nox-27.2-150400.3.6.1.aarch64",
"product_id": "emacs-nox-27.2-150400.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "emacs-x11-27.2-150400.3.6.1.aarch64",
"product": {
"name": "emacs-x11-27.2-150400.3.6.1.aarch64",
"product_id": "emacs-x11-27.2-150400.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "etags-27.2-150400.3.6.1.aarch64",
"product": {
"name": "etags-27.2-150400.3.6.1.aarch64",
"product_id": "etags-27.2-150400.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-27.2-150400.3.6.1.i586",
"product": {
"name": "emacs-27.2-150400.3.6.1.i586",
"product_id": "emacs-27.2-150400.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "emacs-nox-27.2-150400.3.6.1.i586",
"product": {
"name": "emacs-nox-27.2-150400.3.6.1.i586",
"product_id": "emacs-nox-27.2-150400.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "emacs-x11-27.2-150400.3.6.1.i586",
"product": {
"name": "emacs-x11-27.2-150400.3.6.1.i586",
"product_id": "emacs-x11-27.2-150400.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "etags-27.2-150400.3.6.1.i586",
"product": {
"name": "etags-27.2-150400.3.6.1.i586",
"product_id": "etags-27.2-150400.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-el-27.2-150400.3.6.1.noarch",
"product": {
"name": "emacs-el-27.2-150400.3.6.1.noarch",
"product_id": "emacs-el-27.2-150400.3.6.1.noarch"
}
},
{
"category": "product_version",
"name": "emacs-info-27.2-150400.3.6.1.noarch",
"product": {
"name": "emacs-info-27.2-150400.3.6.1.noarch",
"product_id": "emacs-info-27.2-150400.3.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-27.2-150400.3.6.1.ppc64le",
"product": {
"name": "emacs-27.2-150400.3.6.1.ppc64le",
"product_id": "emacs-27.2-150400.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-nox-27.2-150400.3.6.1.ppc64le",
"product": {
"name": "emacs-nox-27.2-150400.3.6.1.ppc64le",
"product_id": "emacs-nox-27.2-150400.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "emacs-x11-27.2-150400.3.6.1.ppc64le",
"product": {
"name": "emacs-x11-27.2-150400.3.6.1.ppc64le",
"product_id": "emacs-x11-27.2-150400.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "etags-27.2-150400.3.6.1.ppc64le",
"product": {
"name": "etags-27.2-150400.3.6.1.ppc64le",
"product_id": "etags-27.2-150400.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-27.2-150400.3.6.1.s390x",
"product": {
"name": "emacs-27.2-150400.3.6.1.s390x",
"product_id": "emacs-27.2-150400.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-nox-27.2-150400.3.6.1.s390x",
"product": {
"name": "emacs-nox-27.2-150400.3.6.1.s390x",
"product_id": "emacs-nox-27.2-150400.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "emacs-x11-27.2-150400.3.6.1.s390x",
"product": {
"name": "emacs-x11-27.2-150400.3.6.1.s390x",
"product_id": "emacs-x11-27.2-150400.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "etags-27.2-150400.3.6.1.s390x",
"product": {
"name": "etags-27.2-150400.3.6.1.s390x",
"product_id": "etags-27.2-150400.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "emacs-27.2-150400.3.6.1.x86_64",
"product": {
"name": "emacs-27.2-150400.3.6.1.x86_64",
"product_id": "emacs-27.2-150400.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-nox-27.2-150400.3.6.1.x86_64",
"product": {
"name": "emacs-nox-27.2-150400.3.6.1.x86_64",
"product_id": "emacs-nox-27.2-150400.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "emacs-x11-27.2-150400.3.6.1.x86_64",
"product": {
"name": "emacs-x11-27.2-150400.3.6.1.x86_64",
"product_id": "emacs-x11-27.2-150400.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "etags-27.2-150400.3.6.1.x86_64",
"product": {
"name": "etags-27.2-150400.3.6.1.x86_64",
"product_id": "etags-27.2-150400.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-27.2-150400.3.6.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch"
},
"product_reference": "emacs-el-27.2-150400.3.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-27.2-150400.3.6.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch"
},
"product_reference": "emacs-info-27.2-150400.3.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64"
},
"product_reference": "etags-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "etags-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x"
},
"product_reference": "etags-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64"
},
"product_reference": "etags-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-27.2-150400.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-el-27.2-150400.3.6.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch"
},
"product_reference": "emacs-el-27.2-150400.3.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-info-27.2-150400.3.6.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch"
},
"product_reference": "emacs-info-27.2-150400.3.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-nox-27.2-150400.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-nox-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "emacs-x11-27.2-150400.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64"
},
"product_reference": "emacs-x11-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64"
},
"product_reference": "etags-27.2-150400.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le"
},
"product_reference": "etags-27.2-150400.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x"
},
"product_reference": "etags-27.2-150400.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etags-27.2-150400.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
},
"product_reference": "etags-27.2-150400.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48337"
}
],
"notes": [
{
"category": "general",
"text": "GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the \"etags -u *\" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48337",
"url": "https://www.suse.com/security/cve/CVE-2022-48337"
},
{
"category": "external",
"summary": "SUSE Bug 1208515 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1208515"
},
{
"category": "external",
"summary": "SUSE Bug 1211499 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1211499"
},
{
"category": "external",
"summary": "SUSE Bug 1211512 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1211512"
},
{
"category": "external",
"summary": "SUSE Bug 1213840 for CVE-2022-48337",
"url": "https://bugzilla.suse.com/1213840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-03-02T11:23:58Z",
"details": "important"
}
],
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48338"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48338",
"url": "https://www.suse.com/security/cve/CVE-2022-48338"
},
{
"category": "external",
"summary": "SUSE Bug 1208514 for CVE-2022-48338",
"url": "https://bugzilla.suse.com/1208514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-03-02T11:23:58Z",
"details": "important"
}
],
"title": "CVE-2022-48338"
},
{
"cve": "CVE-2022-48339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48339"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48339",
"url": "https://www.suse.com/security/cve/CVE-2022-48339"
},
{
"category": "external",
"summary": "SUSE Bug 1208512 for CVE-2022-48339",
"url": "https://bugzilla.suse.com/1208512"
},
{
"category": "external",
"summary": "SUSE Bug 1211512 for CVE-2022-48339",
"url": "https://bugzilla.suse.com/1211512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.6.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:etags-27.2-150400.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-el-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-info-27.2-150400.3.6.1.noarch",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-nox-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:emacs-x11-27.2-150400.3.6.1.x86_64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.aarch64",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.ppc64le",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.s390x",
"openSUSE Leap 15.4:etags-27.2-150400.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-03-02T11:23:58Z",
"details": "important"
}
],
"title": "CVE-2022-48339"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.