vulnerability
Rocky Linux: CVE-2023-28617: emacs (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Mar 19, 2023 | Mar 5, 2024 | Aug 13, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Mar 19, 2023
Added
Mar 5, 2024
Modified
Aug 13, 2025
Description
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
Solutions
rocky-upgrade-emacsrocky-upgrade-emacs-commonrocky-upgrade-emacs-common-debuginforocky-upgrade-emacs-debuginforocky-upgrade-emacs-debugsourcerocky-upgrade-emacs-lucidrocky-upgrade-emacs-lucid-debuginforocky-upgrade-emacs-noxrocky-upgrade-emacs-nox-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.