First published: Wed May 03 2023(Updated: )
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | =26.1-9.el8 | |
GNU Emacs | =27.2-8.el9 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux Eus | =9.2 | |
Redhat Enterprise Linux Server Aus | =8.8 | |
Redhat Enterprise Linux Server Aus | =9.2 | |
Redhat Enterprise Linux Server Tus | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2491 is a vulnerability in the Emacs text editor that allows arbitrary command execution.
GNU Emacs version 26.1-9.el8 and 27.2-8.el9 are affected by CVE-2023-2491.
Red Hat Enterprise Linux version 8.0 and 9.0 are affected by CVE-2023-2491.
CVE-2023-2491 has a severity rating of 7.8 (high).
To fix the CVE-2023-2491 vulnerability, update GNU Emacs to a patched version provided by the vendor.