ELSA-2024-6510

ELSA-2024-6510 - emacs security update

Type:SECURITY
Impact:MODERATE
Release Date:2024-09-09

Description


[1:27.2-10]
- org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code (CVE-2024-39331)
- Disable xwidgets (RHEL-33447)


Related CVEs


CVE-2024-39331

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) emacs-27.2-10.el9_4.src.rpmff21d3e57dd8df42d4b4fd1eaef0dcd48d4feafb94b8928d8cd76ad37a563754-ol9_aarch64_appstream
emacs-27.2-10.el9_4.aarch64.rpm52187c2f6b27cde572dc5f02754e05f398a1f5cccd231cdfc418ee5de5423698-ol9_aarch64_appstream
emacs-common-27.2-10.el9_4.aarch64.rpm936fca487755cdfc65d079835275d1458dab390b89d4e305bec2d13c5ae4cd36-ol9_aarch64_appstream
emacs-filesystem-27.2-10.el9_4.noarch.rpm0bffebadcbfcd594269808b14cb9b5b0689972f19ef76b5137b2a769b09556c1-ol9_aarch64_appstream
emacs-lucid-27.2-10.el9_4.aarch64.rpm9ae019a827e9b0285a3b125c7236171d9e5832985bfdb5fcbd7a27cff2ef95b4-ol9_aarch64_appstream
emacs-nox-27.2-10.el9_4.aarch64.rpmc138bc345f57956d236201b24b892632213cc6be017ce57abe676c30b529a194-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) emacs-27.2-10.el9_4.src.rpmff21d3e57dd8df42d4b4fd1eaef0dcd48d4feafb94b8928d8cd76ad37a563754-ol9_x86_64_appstream
emacs-27.2-10.el9_4.x86_64.rpm763eab78a19f43d42d8f28c298c825a66d2ea9d094007e627f73a6d6ea65d1bc-ol9_x86_64_appstream
emacs-common-27.2-10.el9_4.x86_64.rpm5575e0af6ea3546af2f3a82f6ffc851a9dd2701f440364efa241879f2d13bc82-ol9_x86_64_appstream
emacs-filesystem-27.2-10.el9_4.noarch.rpm0bffebadcbfcd594269808b14cb9b5b0689972f19ef76b5137b2a769b09556c1-ol9_x86_64_appstream
emacs-lucid-27.2-10.el9_4.x86_64.rpm1d5fab144b51da1c1ecfa2e5cc0100306584eb2b0b11259b4736182d0f8b55c8-ol9_x86_64_appstream
emacs-nox-27.2-10.el9_4.x86_64.rpm70bbe3981dcb7034c6d57d1eaab820c2318928f77d520678357bc94c6e04b6ab-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete