Source: emacs
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for emacs. This is no fix
and this is a long-standing issue, so mostly filing a bug for
transparency for now:

CVE-2024-53920[0]:
| In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to
| invoke elisp-completion-at-point (for code completion) on untrusted
| Emacs Lisp source code can trigger unsafe Lisp macro expansion that
| allows attackers to execute arbitrary code. (This unsafe expansion
| also occurs if a user chooses to enable on-the-fly diagnosis that
| byte compiles untrusted Emacs Lisp source code.)

https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html
https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg%40mail.gmail.com/


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-53920
    https://www.cve.org/CVERecord?id=CVE-2024-53920

Please adjust the affected versions in the BTS as needed.

Reply via email to