First published: Tue Mar 05 2024(Updated: )
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.<br>Security Fix(es):<br><li> emacs: ctags local command execution vulnerability (CVE-2022-45939)</li> <li> emacs: command execution via shell metacharacters (CVE-2022-48337)</li> <li> emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/emacs | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debugsource | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-filesystem | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-terminal | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debugsource | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-common-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-debugsource | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-lucid-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs-nox-debuginfo | <26.1-7.el8_6.3 | 26.1-7.el8_6.3 |
redhat/emacs | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-common | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-common-debuginfo | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-debuginfo | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-debugsource | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-lucid | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-lucid-debuginfo | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-nox | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
redhat/emacs-nox-debuginfo | <26.1-7.el8_6.3.aa | 26.1-7.el8_6.3.aa |
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1103 is categorized as moderate due to the potential for local command execution.
To fix RHSA-2024:1103, update the affected packages to version 26.1-7.el8_6.3 or later.
The affected products include Red Hat Enterprise Linux for various architectures such as ARM 64, IBM z Systems, x86_64, and Power LE.
RHSA-2024:1103 addresses a local command execution vulnerability identified as CVE-2022-45939.
There is no official workaround for RHSA-2024:1103, and updating is recommended to mitigate the risk.