{"schema_version":"1.7.2","id":"OESA-2026-2130","modified":"2026-05-03T09:55:35Z","published":"2026-05-03T09:55:35Z","upstream":["CVE-2026-6861"],"summary":"emacs security update","details":"Emacs is the extensible, customizable, self-documenting real-time display editor. At its core is an interpreter for Emacs Lisp, a dialect of the Lisp programming language with extensions to support text editing. And it is an entire ecosystem of functionality beyond text editing, including a project planner, mail and news reader, debugger interface, calendar, and more.\r\n\r\nSecurity Fix(es):\n\nA flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graphics) CSS (Cascading Style Sheets) data. A local user could exploit this by convincing a victim to open a malicious SVG file, which may lead to a denial of service (DoS) or potentially information disclosure.(CVE-2026-6861)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"emacs","purl":"pkg:rpm/openEuler/emacs&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"29.1-8.oe2403"}]}],"ecosystem_specific":{"aarch64":["emacs-29.1-8.oe2403.aarch64.rpm","emacs-common-29.1-8.oe2403.aarch64.rpm","emacs-debuginfo-29.1-8.oe2403.aarch64.rpm","emacs-debugsource-29.1-8.oe2403.aarch64.rpm","emacs-devel-29.1-8.oe2403.aarch64.rpm","emacs-lucid-29.1-8.oe2403.aarch64.rpm","emacs-nox-29.1-8.oe2403.aarch64.rpm"],"noarch":["emacs-filesystem-29.1-8.oe2403.noarch.rpm","emacs-help-29.1-8.oe2403.noarch.rpm","emacs-terminal-29.1-8.oe2403.noarch.rpm"],"src":["emacs-29.1-8.oe2403.src.rpm"],"x86_64":["emacs-29.1-8.oe2403.x86_64.rpm","emacs-common-29.1-8.oe2403.x86_64.rpm","emacs-debuginfo-29.1-8.oe2403.x86_64.rpm","emacs-debugsource-29.1-8.oe2403.x86_64.rpm","emacs-devel-29.1-8.oe2403.x86_64.rpm","emacs-lucid-29.1-8.oe2403.x86_64.rpm","emacs-nox-29.1-8.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6861"}],"database_specific":{"severity":"Medium"}}
