Rocky Linux: RLSA-2023:2074 emacs security update
Summary
An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
RPMs
emacs-1:27.2-6.el9_1.1.aarch64.rpm
emacs-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-1:27.2-6.el9_1.1.s390x.rpm
emacs-1:27.2-6.el9_1.1.src.rpm
emacs-1:27.2-6.el9_1.1.x86_64.rpm
emacs-common-1:27.2-6.el9_1.1.aarch64.rpm
emacs-common-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-common-1:27.2-6.el9_1.1.s390x.rpm
emacs-common-1:27.2-6.el9_1.1.x86_64.rpm
emacs-common-debuginfo-1:27.2-6.el9_1.1.aarch64.rpm
emacs-common-debuginfo-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-common-debuginfo-1:27.2-6.el9_1.1.s390x.rpm
emacs-common-debuginfo-1:27.2-6.el9_1.1.x86_64.rpm
emacs-debuginfo-1:27.2-6.el9_1.1.aarch64.rpm
emacs-debuginfo-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-debuginfo-1:27.2-6.el9_1.1.s390x.rpm
emacs-debuginfo-1:27.2-6.el9_1.1.x86_64.rpm
emacs-debugsource-1:27.2-6.el9_1.1.aarch64.rpm
emacs-debugsource-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-debugsource-1:27.2-6.el9_1.1.s390x.rpm
emacs-debugsource-1:27.2-6.el9_1.1.x86_64.rpm
emacs-filesystem-1:27.2-6.el9_1.1.noarch.rpm
emacs-lucid-1:27.2-6.el9_1.1.aarch64.rpm
emacs-lucid-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-lucid-1:27.2-6.el9_1.1.s390x.rpm
emacs-lucid-1:27.2-6.el9_1.1.x86_64.rpm
emacs-lucid-debuginfo-1:27.2-6.el9_1.1.aarch64.rpm
emacs-lucid-debuginfo-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-lucid-debuginfo-1:27.2-6.el9_1.1.s390x.rpm
emacs-lucid-debuginfo-1:27.2-6.el9_1.1.x86_64.rpm
emacs-nox-1:27.2-6.el9_1.1.aarch64.rpm
emacs-nox-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-nox-1:27.2-6.el9_1.1.s390x.rpm
emacs-nox-1:27.2-6.el9_1.1.x86_64.rpm
emacs-nox-debuginfo-1:27.2-6.el9_1.1.aarch64.rpm
emacs-nox-debuginfo-1:27.2-6.el9_1.1.ppc64le.rpm
emacs-nox-debuginfo-1:27.2-6.el9_1.1.s390x.rpm
emacs-nox-debuginfo-1:27.2-6.el9_1.1.x86_64.rpm
References
No References
CVEs
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28617
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=2180544