Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.2691 emacs security update 11 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: emacs Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2023-28617 CVE-2022-48339 CVE-2022-48337 Original Bulletin: https://lists.debian.org/debian-lts-announce/2023/05/msg00008.html Comment: CVSS (Max): 9.8 CVE-2022-48337 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3416-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany May 10, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : emacs Version : 1:26.1+1-3.2+deb10u4 CVE ID : CVE-2022-48337 CVE-2022-48339 CVE-2023-28617 Debian Bug : 1031730 1033342 Xi Lu discovered that missing input sanitizing in Emacs could result in the execution of arbitrary shell commands. For Debian 10 buster, these problems have been fixed in version 1:26.1+1-3.2+deb10u4. We recommend that you upgrade your emacs packages. For the detailed security status of emacs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/emacs Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZFxw4ckNZI30y1K9AQjtxA/8C9aY+N0jpnRWzjIN61xSZEbdf2s7qwFX WDKvlv00FAbQ7iRi36puMWBUU/IuHL3jYy6d85VyKJxzyh5ToalCohoWxIvrZG9f MSso6/UPWNt+V8QkRaLtyBuT5u3PGonPnn2ky6pCm684DkQ1X35EH77hS3ezPtQs zcMnt7TRNqpB/7J/Rih26AOFeXkszYzUwF0OlMWak6gdv9AGXszERyIbPcEjDVB5 /LUH7zEdm0FvnoJYsaG6WQpzcd+jFGJqXT/9tWMmRZJuDyfRP6nj3gIFD1V1qaea umX1L9gcLxjkNvRZ2qyx0y+WnFZb9YDIIlEeuRhZYxveH/14MNjYARmAJD4sGYR+ ZIk+d6bhnl7AWHH3+zXeB6+SaDrS0RLdEB5h2tpXRcRryH+LLjtwVpjQ/8mKvel6 qRKQVpOW+fWcKKFtsWo9sarrnpLzmWOQ5uHNeNiQIgHVJxjqNHwx+ZGvUsqIFPcK 4wds9cPTN83zb6LJK78teF8KR38JBd35pJ7Z/zoUwHEjTUkmfFp6VnmUd7oqXllY 6D2ffzFzQ2md28bhh/eFwlDrYATX7Ycr2mGK1C1K1kOM2hCFGjo2POBSDaSEkryI +YXPksniq4wyqpFpOlwxPNoYfIZST6RM5vyNiVVz8EqdUvfuZuadBMWVnKq72X4D iK8bVahdOk0= =Kyaq -----END PGP SIGNATURE-----