Bug 2192873 (CVE-2023-2491)

Summary: CVE-2023-2491 emacs: Regression of CVE-2023-28617 fixes in the Red Hat Enterprise Linux
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: jmigacz
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: emacs 26.1-10.el8_8.2, emacs 27.2-8.el9_2.1 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-17 04:31:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2192880, 2192881    
Bug Blocks: 2179730    

Description TEJ RATHI 2023-05-03 11:25:01 UTC
The Emacs flaw CVE-2023-28617 (bug 2180544) was addressed in Red Hat Enterprise Linux 8 via erratum RHSA-2023:1930 and in Red Hat Enterprise Linux 9 via erratum RHSA-2023:2074, released on Apr 24, 2023 and May 02, 2023 respectively.

https://access.redhat.com/errata/RHSA-2023:1930
https://access.redhat.com/errata/RHSA-2023:2074 

However, the fix for this issue was not included in the Emacs updates released as part of Red Hat Enterprise Linux 8.8 GA erratum (RHSA-2023:3042) and Red Hat Enterprise Linux 9.2 GA erratum (RHSA-2023:2366), causing a security regression of previously released fix. A new CVE-ID CVE-2023-2491 was assigned for this security regression.

Note that this issue and CVE-ID is specific to the Emacs packages as shipped with Red Hat Enterprise Linux and is not applicable to any upstream Emacs version or Emacs packages of any other vendor that are not directly based on Red Hat Enterprise Linux packages.

For more information about the original flaw, refer to the CVE page or bug linked above.

Comment 3 errata-xmlrpc 2023-05-09 11:04:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2626 https://access.redhat.com/errata/RHSA-2023:2626

Comment 4 errata-xmlrpc 2023-05-16 10:01:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:3104 https://access.redhat.com/errata/RHSA-2023:3104

Comment 5 Product Security DevOps Team 2023-05-17 04:31:00 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-2491