Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-2491 (GCVE-0-2023-2491)
Vulnerability from cvelistv5
Published
2023-05-17 00:00
      Modified
2025-01-22 18:23
      
          Severity ?
        
        
      
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - CWE-77 - - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
            
          
        References
          | URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
Impacted products
        
      {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:26:08.963Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2023:3104"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2023:2626"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-2491",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-22T18:23:37.804357Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-22T18:23:43.462Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "emacs",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Affects emacs v26.1-9.el8 and emacs v27.2-8.el9, Fixed in emacs v26.1-10.el8_8.2 and emacs v27.2-8.el9_2.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 - Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-17T00:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "url": "https://access.redhat.com/errata/RHSA-2023:3104"
        },
        {
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2023-2491",
    "datePublished": "2023-05-17T00:00:00.000Z",
    "dateReserved": "2023-05-03T00:00:00.000Z",
    "dateUpdated": "2025-01-22T18:23:43.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-2491\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-05-17T22:15:10.997\",\"lastModified\":\"2025-01-22T19:15:09.470\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \\\"org-babel-execute:latex\\\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:emacs:26.1-9.el8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D22AA80-5195-415F-B400-E15FDA9DB01C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:emacs:27.2-8.el9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CA40AF-31C9-43CA-B6F1-2B67222B9271\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C31522-0A17-4025-B269-855C7F4B45C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C74F6FA-FA6C-4648-9079-91446E45EE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD25A35-9C2B-4382-8720-4E39F928170B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32CA554-F9D7-425B-8F1C-89678507F28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CA946D-1665-4874-9D41-C7D963DD1F56\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2023:2626\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:3104\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-2491\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2192873\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:2626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:3104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-2491\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2192873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2192873\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-2491\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:3104\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:2626\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:26:08.963Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-2491\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-22T18:23:37.804357Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-22T18:23:29.246Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"emacs\", \"versions\": [{\"status\": \"affected\", \"version\": \"Affects emacs v26.1-9.el8 and emacs v27.2-8.el9, Fixed in emacs v26.1-10.el8_8.2 and emacs v27.2-8.el9_2.1\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2192873\"}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-2491\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:3104\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2023:2626\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \\\"org-babel-execute:latex\\\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77 - Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-05-17T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-2491\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-22T18:23:43.462Z\", \"dateReserved\": \"2023-05-03T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2023-05-17T00:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  fkie_cve-2023-2491
Vulnerability from fkie_nvd
Published
2023-05-17 22:15
    Modified
2025-01-22 19:15
    
          Severity ?
        
        
        
        
          
            
            
            
          
          
          
            
            7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
          
        
      
    7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
    References
      | URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2023:2626 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2023:3104 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-2491 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2023:2626 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2023:3104 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-2491 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2192873 | Issue Tracking, Third Party Advisory | 
Impacted products
      | Vendor | Product | Version | |
|---|---|---|---|
| gnu | emacs | 26.1-9.el8 | |
| gnu | emacs | 27.2-8.el9 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux | 9.0 | |
| redhat | enterprise_linux_eus | 8.8 | |
| redhat | enterprise_linux_eus | 9.2 | |
| redhat | enterprise_linux_server_aus | 8.8 | |
| redhat | enterprise_linux_server_aus | 9.2 | |
| redhat | enterprise_linux_server_tus | 8.8 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:emacs:26.1-9.el8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D22AA80-5195-415F-B400-E15FDA9DB01C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:emacs:27.2-8.el9:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CA40AF-31C9-43CA-B6F1-2B67222B9271",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CD25A35-9C2B-4382-8720-4E39F928170B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2."
    }
  ],
  "id": "CVE-2023-2491",
  "lastModified": "2025-01-22T19:15:09.470",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-17T22:15:10.997",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:2626"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:3104"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:2626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:3104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  wid-sec-w-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
    Modified
2025-10-23 22:00
    Summary
Red Hat OpenShift: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1542 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1542 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3742"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:3614"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3615"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:3613"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3918"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3943"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3910"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3915"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3925"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2023:4003"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4025"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4112"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4113"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4114"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4053"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4204"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4090"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4241"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4091"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4225"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4226"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03",
        "url": "https://access.redhat.com/errata/RHSA-2023:4470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:4335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:4674"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:4983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:5103"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5233"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6316"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7058"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7672"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:7820"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:5006"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7823"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0139"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0137"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0121"
      },
      {
        "category": "external",
        "summary": "Meinberg Security Advisory",
        "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04",
        "url": "https://security.gentoo.org/glsa/202405-04"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:2987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3254"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2024:4631"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:19094"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-23T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-24T08:33:28.970+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1542",
      "initial_release_date": "2023-06-22T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-06-22T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-06-25T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-26T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-05T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-10T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-07-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-18T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-20T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-26T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-03T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-23T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-12T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-19T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-20T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-14T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-21T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-03T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-12-06T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-13T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-01T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-04T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-10T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-30T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Meinberg aufgenommen"
        },
        {
          "date": "2024-05-05T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-18T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "34"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.08.007",
                "product": {
                  "name": "Meinberg LANTIME \u003c7.08.007",
                  "product_id": "T032435"
                }
              },
              {
                "category": "product_version",
                "name": "7.08.007",
                "product": {
                  "name": "Meinberg LANTIME 7.08.007",
                  "product_id": "T032435-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:meinberg:lantime:7.08.007"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "LANTIME"
          }
        ],
        "category": "vendor",
        "name": "Meinberg"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Advanced Cluster Security for Kubernetes 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
                  "product_id": "T027916",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift",
                "product": {
                  "name": "Red Hat OpenShift",
                  "product_id": "T008027",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.13.4",
                  "product_id": "T028225"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.13.4",
                  "product_id": "T028225-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.13.0",
                  "product_id": "T028289"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.13.0",
                  "product_id": "T028289-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.22",
                  "product_id": "T028307"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.22",
                  "product_id": "T028307-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.11.44",
                  "product_id": "T028416"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11.44",
                  "product_id": "T028416-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.12.10",
                  "product_id": "T031698"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.12.10",
                  "product_id": "T031698-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.0",
                  "product_id": "T031839"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.0",
                  "product_id": "T031839-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.46",
                  "product_id": "T031870"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.46",
                  "product_id": "T031870-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-20107",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2018-25032",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2020-10735",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-16250",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16250"
    },
    {
      "cve": "CVE-2020-16251",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16251"
    },
    {
      "cve": "CVE-2020-17049",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2021-28861",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-3765",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3765"
    },
    {
      "cve": "CVE-2021-3807",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3807"
    },
    {
      "cve": "CVE-2021-4231",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4231"
    },
    {
      "cve": "CVE-2021-4235",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4235"
    },
    {
      "cve": "CVE-2021-4238",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4238"
    },
    {
      "cve": "CVE-2021-43519",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43519"
    },
    {
      "cve": "CVE-2021-43998",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43998"
    },
    {
      "cve": "CVE-2021-44531",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44964",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-46828",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0670",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-0670"
    },
    {
      "cve": "CVE-2022-1271",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1348",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1348"
    },
    {
      "cve": "CVE-2022-1586",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1586"
    },
    {
      "cve": "CVE-2022-1587",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1587"
    },
    {
      "cve": "CVE-2022-21824",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-2309",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2309"
    },
    {
      "cve": "CVE-2022-23540",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23540"
    },
    {
      "cve": "CVE-2022-23541",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23541"
    },
    {
      "cve": "CVE-2022-24903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-24903"
    },
    {
      "cve": "CVE-2022-2509",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-26280",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-26280"
    },
    {
      "cve": "CVE-2022-27664",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-27664"
    },
    {
      "cve": "CVE-2022-2795",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-2879",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2879"
    },
    {
      "cve": "CVE-2022-2880",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2880"
    },
    {
      "cve": "CVE-2022-28805",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-28805"
    },
    {
      "cve": "CVE-2022-29154",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-29154"
    },
    {
      "cve": "CVE-2022-30635",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-30635"
    },
    {
      "cve": "CVE-2022-3094",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-31129",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-31129"
    },
    {
      "cve": "CVE-2022-32189",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32189"
    },
    {
      "cve": "CVE-2022-32190",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32190"
    },
    {
      "cve": "CVE-2022-33099",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-33099"
    },
    {
      "cve": "CVE-2022-3358",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3358"
    },
    {
      "cve": "CVE-2022-34903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-34903"
    },
    {
      "cve": "CVE-2022-3515",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3515"
    },
    {
      "cve": "CVE-2022-3517",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-35737",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-36227",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-3715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3736",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3736"
    },
    {
      "cve": "CVE-2022-37434",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-38149",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38149"
    },
    {
      "cve": "CVE-2022-3821",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-38900",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38900"
    },
    {
      "cve": "CVE-2022-3924",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3924"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40897",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40897"
    },
    {
      "cve": "CVE-2022-41316",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41316"
    },
    {
      "cve": "CVE-2022-41715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41715"
    },
    {
      "cve": "CVE-2022-41717",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41717"
    },
    {
      "cve": "CVE-2022-41723",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41723"
    },
    {
      "cve": "CVE-2022-41724",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41724"
    },
    {
      "cve": "CVE-2022-41725",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41725"
    },
    {
      "cve": "CVE-2022-42010",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42010"
    },
    {
      "cve": "CVE-2022-42011",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42011"
    },
    {
      "cve": "CVE-2022-42012",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42012"
    },
    {
      "cve": "CVE-2022-42898",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42919",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42919"
    },
    {
      "cve": "CVE-2022-43680",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-4415",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-4415"
    },
    {
      "cve": "CVE-2022-45061",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46175",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-46175"
    },
    {
      "cve": "CVE-2022-47024",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48337",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48337"
    },
    {
      "cve": "CVE-2022-48338",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48338"
    },
    {
      "cve": "CVE-2022-48339",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48339"
    },
    {
      "cve": "CVE-2023-0361",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0620",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0620"
    },
    {
      "cve": "CVE-2023-0665",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0665"
    },
    {
      "cve": "CVE-2023-22809",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-22809"
    },
    {
      "cve": "CVE-2023-24329",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-2491",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-2491"
    },
    {
      "cve": "CVE-2023-24999",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24999"
    },
    {
      "cve": "CVE-2023-25000",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25000"
    },
    {
      "cve": "CVE-2023-25136",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25136"
    }
  ]
}
  WID-SEC-W-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
    Modified
2025-10-23 22:00
    Summary
Red Hat OpenShift: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1542 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1542 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3742"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:3614"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3615"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:3613"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3918"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3943"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3910"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3915"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3925"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2023:4003"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4025"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4112"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4113"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4114"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4053"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4204"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4090"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4241"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4091"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4225"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4226"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03",
        "url": "https://access.redhat.com/errata/RHSA-2023:4470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:4335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:4674"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:4983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:5103"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5233"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6316"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7058"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7672"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:7820"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:5006"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7823"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0139"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0137"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0121"
      },
      {
        "category": "external",
        "summary": "Meinberg Security Advisory",
        "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04",
        "url": "https://security.gentoo.org/glsa/202405-04"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:2987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3254"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2024:4631"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:19094"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-23T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-24T08:33:28.970+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1542",
      "initial_release_date": "2023-06-22T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-06-22T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-06-25T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-26T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-05T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-10T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-07-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-18T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-20T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-26T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-03T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-23T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-12T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-19T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-20T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-14T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-21T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-03T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-12-06T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-13T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-01T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-04T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-10T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-30T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Meinberg aufgenommen"
        },
        {
          "date": "2024-05-05T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-18T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "34"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.08.007",
                "product": {
                  "name": "Meinberg LANTIME \u003c7.08.007",
                  "product_id": "T032435"
                }
              },
              {
                "category": "product_version",
                "name": "7.08.007",
                "product": {
                  "name": "Meinberg LANTIME 7.08.007",
                  "product_id": "T032435-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:meinberg:lantime:7.08.007"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "LANTIME"
          }
        ],
        "category": "vendor",
        "name": "Meinberg"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Advanced Cluster Security for Kubernetes 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
                  "product_id": "T027916",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift",
                "product": {
                  "name": "Red Hat OpenShift",
                  "product_id": "T008027",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.13.4",
                  "product_id": "T028225"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.13.4",
                  "product_id": "T028225-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.13.0",
                  "product_id": "T028289"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.13.0",
                  "product_id": "T028289-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.22",
                  "product_id": "T028307"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.22",
                  "product_id": "T028307-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.11.44",
                  "product_id": "T028416"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11.44",
                  "product_id": "T028416-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.12.10",
                  "product_id": "T031698"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.12.10",
                  "product_id": "T031698-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.0",
                  "product_id": "T031839"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.0",
                  "product_id": "T031839-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.46",
                  "product_id": "T031870"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.46",
                  "product_id": "T031870-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-20107",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2018-25032",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2020-10735",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-16250",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16250"
    },
    {
      "cve": "CVE-2020-16251",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16251"
    },
    {
      "cve": "CVE-2020-17049",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2021-28861",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-3765",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3765"
    },
    {
      "cve": "CVE-2021-3807",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3807"
    },
    {
      "cve": "CVE-2021-4231",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4231"
    },
    {
      "cve": "CVE-2021-4235",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4235"
    },
    {
      "cve": "CVE-2021-4238",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4238"
    },
    {
      "cve": "CVE-2021-43519",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43519"
    },
    {
      "cve": "CVE-2021-43998",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43998"
    },
    {
      "cve": "CVE-2021-44531",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44964",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-46828",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0670",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-0670"
    },
    {
      "cve": "CVE-2022-1271",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1348",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1348"
    },
    {
      "cve": "CVE-2022-1586",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1586"
    },
    {
      "cve": "CVE-2022-1587",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1587"
    },
    {
      "cve": "CVE-2022-21824",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-2309",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2309"
    },
    {
      "cve": "CVE-2022-23540",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23540"
    },
    {
      "cve": "CVE-2022-23541",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23541"
    },
    {
      "cve": "CVE-2022-24903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-24903"
    },
    {
      "cve": "CVE-2022-2509",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-26280",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-26280"
    },
    {
      "cve": "CVE-2022-27664",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-27664"
    },
    {
      "cve": "CVE-2022-2795",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-2879",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2879"
    },
    {
      "cve": "CVE-2022-2880",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2880"
    },
    {
      "cve": "CVE-2022-28805",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-28805"
    },
    {
      "cve": "CVE-2022-29154",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-29154"
    },
    {
      "cve": "CVE-2022-30635",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-30635"
    },
    {
      "cve": "CVE-2022-3094",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-31129",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-31129"
    },
    {
      "cve": "CVE-2022-32189",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32189"
    },
    {
      "cve": "CVE-2022-32190",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32190"
    },
    {
      "cve": "CVE-2022-33099",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-33099"
    },
    {
      "cve": "CVE-2022-3358",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3358"
    },
    {
      "cve": "CVE-2022-34903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-34903"
    },
    {
      "cve": "CVE-2022-3515",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3515"
    },
    {
      "cve": "CVE-2022-3517",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-35737",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-36227",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-3715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3736",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3736"
    },
    {
      "cve": "CVE-2022-37434",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-38149",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38149"
    },
    {
      "cve": "CVE-2022-3821",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-38900",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38900"
    },
    {
      "cve": "CVE-2022-3924",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3924"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40897",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40897"
    },
    {
      "cve": "CVE-2022-41316",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41316"
    },
    {
      "cve": "CVE-2022-41715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41715"
    },
    {
      "cve": "CVE-2022-41717",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41717"
    },
    {
      "cve": "CVE-2022-41723",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41723"
    },
    {
      "cve": "CVE-2022-41724",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41724"
    },
    {
      "cve": "CVE-2022-41725",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41725"
    },
    {
      "cve": "CVE-2022-42010",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42010"
    },
    {
      "cve": "CVE-2022-42011",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42011"
    },
    {
      "cve": "CVE-2022-42012",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42012"
    },
    {
      "cve": "CVE-2022-42898",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42919",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42919"
    },
    {
      "cve": "CVE-2022-43680",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-4415",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-4415"
    },
    {
      "cve": "CVE-2022-45061",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46175",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-46175"
    },
    {
      "cve": "CVE-2022-47024",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48337",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48337"
    },
    {
      "cve": "CVE-2022-48338",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48338"
    },
    {
      "cve": "CVE-2022-48339",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48339"
    },
    {
      "cve": "CVE-2023-0361",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0620",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0620"
    },
    {
      "cve": "CVE-2023-0665",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0665"
    },
    {
      "cve": "CVE-2023-22809",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-22809"
    },
    {
      "cve": "CVE-2023-24329",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-2491",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-2491"
    },
    {
      "cve": "CVE-2023-24999",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24999"
    },
    {
      "cve": "CVE-2023-25000",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25000"
    },
    {
      "cve": "CVE-2023-25136",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25136"
    }
  ]
}
  rhsa-2023_2626
Vulnerability from csaf_redhat
Published
2023-05-09 11:16
    Modified
2024-11-22 22:39
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
* emacs: command execution via shell metacharacters (CVE-2022-48337)
* emacs: local command injection in ruby-mode.el (CVE-2022-48338)
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2626",
        "url": "https://access.redhat.com/errata/RHSA-2023:2626"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2171987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
      },
      {
        "category": "external",
        "summary": "2171988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
      },
      {
        "category": "external",
        "summary": "2171989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2626.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2024-11-22T22:39:49+00:00",
      "generator": {
        "date": "2024-11-22T22:39:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:2626",
      "initial_release_date": "2023-05-09T11:16:54+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T22:39:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.src",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.src",
                  "product_id": "emacs-1:27.2-8.el9_2.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                "product": {
                  "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_id": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch"
        },
        "product_reference": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-48337",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171987"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command execution via shell metacharacters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171987",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command execution via shell metacharacters"
    },
    {
      "cve": "CVE-2022-48338",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: local command injection in ruby-mode.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user runs Emacs with untrusted input. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48338",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: local command injection in ruby-mode.el"
    },
    {
      "cve": "CVE-2022-48339",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171989"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command injection vulnerability in htmlfontify.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file or directory with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171989",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48339",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command injection vulnerability in htmlfontify.el"
    },
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  rhsa-2023:3104
Vulnerability from csaf_redhat
Published
2023-05-16 10:16
    Modified
2025-10-09 23:55
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:3104",
        "url": "https://access.redhat.com/errata/RHSA-2023:3104"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3104.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2025-10-09T23:55:58+00:00",
      "generator": {
        "date": "2025-10-09T23:55:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:3104",
      "initial_release_date": "2023-05-16T10:16:57+00:00",
      "revision_history": [
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T23:55:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-terminal@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.src",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.src",
                  "product_id": "emacs-1:26.1-10.el8_8.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T10:16:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:3104"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  rhsa-2023:2626
Vulnerability from csaf_redhat
Published
2023-05-09 11:16
    Modified
2025-10-09 22:36
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
* emacs: command execution via shell metacharacters (CVE-2022-48337)
* emacs: local command injection in ruby-mode.el (CVE-2022-48338)
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2626",
        "url": "https://access.redhat.com/errata/RHSA-2023:2626"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2171987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
      },
      {
        "category": "external",
        "summary": "2171988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
      },
      {
        "category": "external",
        "summary": "2171989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2626.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2025-10-09T22:36:21+00:00",
      "generator": {
        "date": "2025-10-09T22:36:21+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:2626",
      "initial_release_date": "2023-05-09T11:16:54+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T22:36:21+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.src",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.src",
                  "product_id": "emacs-1:27.2-8.el9_2.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                "product": {
                  "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_id": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch"
        },
        "product_reference": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-48337",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171987"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command execution via shell metacharacters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171987",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command execution via shell metacharacters"
    },
    {
      "cve": "CVE-2022-48338",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: local command injection in ruby-mode.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user runs Emacs with untrusted input. For this reason, this flaw has been rated with a Moderate security impact.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations were established during the initial design of the system architecture and security boundary. Static code testing (SAST, DAST) is conducted before entry into the environment. CI/CD configurations help to restrict the use of commands or scripts that could be exploited by command injection and are coupled with a two-person review for all manual code promotions. The attack surface is limited through least privilege and least functionality enforcement, ensuring only authorized personnel can carry out these tasks and that only essential services and ports are enabled. Input validation is performed for all services or features within the system boundary, reducing the risk of improper input handling or command injection. Additionally, malicious code protection and system monitoring work together to minimize potential impacts by detecting, blocking, and responding in the case of successful exploitation.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48338",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: local command injection in ruby-mode.el"
    },
    {
      "cve": "CVE-2022-48339",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171989"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command injection vulnerability in htmlfontify.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file or directory with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171989",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48339",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command injection vulnerability in htmlfontify.el"
    },
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  RHSA-2023:2626
Vulnerability from csaf_redhat
Published
2023-05-09 11:16
    Modified
2025-10-09 22:36
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
* emacs: command execution via shell metacharacters (CVE-2022-48337)
* emacs: local command injection in ruby-mode.el (CVE-2022-48338)
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\n* emacs: command execution via shell metacharacters (CVE-2022-48337)\n\n* emacs: local command injection in ruby-mode.el (CVE-2022-48338)\n\n* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2626",
        "url": "https://access.redhat.com/errata/RHSA-2023:2626"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2171987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
      },
      {
        "category": "external",
        "summary": "2171988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
      },
      {
        "category": "external",
        "summary": "2171989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2626.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2025-10-09T22:36:21+00:00",
      "generator": {
        "date": "2025-10-09T22:36:21+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:2626",
      "initial_release_date": "2023-05-09T11:16:54+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T11:16:54+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T22:36:21+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.src",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.src",
                  "product_id": "emacs-1:27.2-8.el9_2.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_id": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@27.2-8.el9_2.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                "product": {
                  "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_id": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@27.2-8.el9_2.1?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:27.2-8.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch"
        },
        "product_reference": "emacs-filesystem-1:27.2-8.el9_2.1.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-48337",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171987"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. This flaw allows attackers to execute commands via shell metacharacters in the name of a source-code file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command execution via shell metacharacters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171987",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171987"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48337"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command execution via shell metacharacters"
    },
    {
      "cve": "CVE-2022-48338",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. A malicious ruby source file may cause a local command injection.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: local command injection in ruby-mode.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user runs Emacs with untrusted input. For this reason, this flaw has been rated with a Moderate security impact.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations were established during the initial design of the system architecture and security boundary. Static code testing (SAST, DAST) is conducted before entry into the environment. CI/CD configurations help to restrict the use of commands or scripts that could be exploited by command injection and are coupled with a two-person review for all manual code promotions. The attack surface is limited through least privilege and least functionality enforcement, ensuring only authorized personnel can carry out these tasks and that only essential services and ports are enabled. Input validation is performed for all services or features within the system boundary, reducing the risk of improper input handling or command injection. Additionally, malicious code protection and system monitoring work together to minimize potential impacts by detecting, blocking, and responding in the case of successful exploitation.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48338",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48338"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48338"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: local command injection in ruby-mode.el"
    },
    {
      "cve": "CVE-2022-48339",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2171989"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: command injection vulnerability in htmlfontify.el",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is only triggered when a local user introduces untrusted input, via a file or directory with a crafted name. For this reason, this flaw has been rated with a Moderate security impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "RHBZ#2171989",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171989"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48339",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48339"
        }
      ],
      "release_date": "2023-02-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "emacs: command injection vulnerability in htmlfontify.el"
    },
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
          "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T11:16:54+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2626"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.src",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-common-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-debugsource-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-filesystem-1:27.2-8.el9_2.1.noarch",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-1:27.2-8.el9_2.1.x86_64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.aarch64",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.ppc64le",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.s390x",
            "AppStream-9.2.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:27.2-8.el9_2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  rhsa-2023_3104
Vulnerability from csaf_redhat
Published
2023-05-16 10:16
    Modified
2024-11-22 22:40
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:3104",
        "url": "https://access.redhat.com/errata/RHSA-2023:3104"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3104.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2024-11-22T22:40:00+00:00",
      "generator": {
        "date": "2024-11-22T22:40:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:3104",
      "initial_release_date": "2023-05-16T10:16:57+00:00",
      "revision_history": [
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T22:40:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-terminal@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.src",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.src",
                  "product_id": "emacs-1:26.1-10.el8_8.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T10:16:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:3104"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  RHSA-2023:3104
Vulnerability from csaf_redhat
Published
2023-05-16 10:16
    Modified
2025-10-09 23:55
    Summary
Red Hat Security Advisory: emacs security update
    Notes
Topic
An update for emacs is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for emacs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.\n\nSecurity Fix(es):\n\n* emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux (CVE-2023-2491)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:3104",
        "url": "https://access.redhat.com/errata/RHSA-2023:3104"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2192873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3104.json"
      }
    ],
    "title": "Red Hat Security Advisory: emacs security update",
    "tracking": {
      "current_release_date": "2025-10-09T23:55:58+00:00",
      "generator": {
        "date": "2025-10-09T23:55:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:3104",
      "initial_release_date": "2023-05-16T10:16:57+00:00",
      "revision_history": [
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-16T10:16:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T23:55:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debugsource@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-common-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-lucid-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                "product": {
                  "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_id": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-nox-debuginfo@26.1-10.el8_8.2?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-terminal@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                "product": {
                  "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_id": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs-filesystem@26.1-10.el8_8.2?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "emacs-1:26.1-10.el8_8.2.src",
                "product": {
                  "name": "emacs-1:26.1-10.el8_8.2.src",
                  "product_id": "emacs-1:26.1-10.el8_8.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/emacs@26.1-10.el8_8.2?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.src",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-filesystem-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-filesystem-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64"
        },
        "product_reference": "emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "emacs-terminal-1:26.1-10.el8_8.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        },
        "product_reference": "emacs-terminal-1:26.1-10.el8_8.2.noarch",
        "relates_to_product_reference": "BaseOS-8.8.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-2491",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2023-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2192873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2, which introduced this regression via the following errata:\n\nhttps://access.redhat.com/errata/RHSA-2023:3042 (Red Hat Enterprise Linux 8.8)\nhttps://access.redhat.com/errata/RHSA-2023:2366 (Red Hat Enterprise Linux 9.2)\n\nThese errata provided updates for emacs package, but did not include fixes for CVE-2023-28617.\n\nA user who installs or updates to Red Hat Enterprise Linux 8.8 or Red Hat Enterprise Linux 9.2 would be vulnerable to the CVE-2023-28617, even if they were properly fixed in Red Hat Enterprise Linux 8.7 and in Red Hat Enterprise Linux 9.1. The CVE-2023-2491 was assigned to that Red Hat specific security regression and it is not applicable to any upstream emacs version or emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.\n\nFor more details about the original security issue CVE-2023-28617, refer to the CVE page: https://access.redhat.com/security/cve/CVE-2023-28617.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
          "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2192873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
        }
      ],
      "release_date": "2023-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T10:16:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:3104"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "AppStream-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.src",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-common-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-debugsource-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-filesystem-1:26.1-10.el8_8.2.noarch",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-lucid-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.aarch64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.ppc64le",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.s390x",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-nox-debuginfo-1:26.1-10.el8_8.2.x86_64",
            "BaseOS-8.8.0.Z.MAIN.EUS:emacs-terminal-1:26.1-10.el8_8.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux"
    }
  ]
}
  gsd-2023-2491
Vulnerability from gsd
Modified
2023-12-13 01:20
      Details
        
          A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2023-2491",
    "id": "GSD-2023-2491"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-2491"
      ],
      "details": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
      "id": "GSD-2023-2491",
      "modified": "2023-12-13T01:20:31.984425Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2023-2491",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "emacs",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "Affects emacs v26.1-9.el8 and emacs v27.2-8.el9, Fixed in emacs v26.1-10.el8_8.2 and emacs v27.2-8.el9_2.1"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-77 - Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
          },
          {
            "name": "https://access.redhat.com/security/cve/CVE-2023-2491",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2023:3104",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2023:3104"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2023:2626",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2023:2626"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:gnu:emacs:26.1-9.el8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:gnu:emacs:27.2-8.el9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2023-2491"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873",
              "refsource": "MISC",
              "tags": [
                "Issue Tracking",
                "Third Party Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
            },
            {
              "name": "https://access.redhat.com/errata/RHSA-2023:2626",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2023:2626"
            },
            {
              "name": "https://access.redhat.com/errata/RHSA-2023:3104",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2023:3104"
            },
            {
              "name": "https://access.redhat.com/security/cve/CVE-2023-2491",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2023-05-25T17:25Z",
      "publishedDate": "2023-05-17T22:15Z"
    }
  }
}
  ghsa-2hj6-9wp7-hvmh
Vulnerability from github
Published
2023-05-18 00:30
    Modified
2024-04-04 04:14
    
        Severity ?
      
      
    
        VLAI Severity ?
      
      Details
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
{
  "affected": [],
  "aliases": [
    "CVE-2023-2491"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-77"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2023-05-17T22:15:10Z",
    "severity": "HIGH"
  },
  "details": "A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the \"org-babel-execute:latex\" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.",
  "id": "GHSA-2hj6-9wp7-hvmh",
  "modified": "2024-04-04T04:14:00Z",
  "published": "2023-05-18T00:30:41Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2491"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2023:2626"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2023:3104"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2023-2491"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192873"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…