Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-53558.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-53558
Upstream
Published
2024-11-27T15:15:26Z
Modified
2026-04-01T05:16:34.119396Z
Summary
CVE-2024-53920 affecting package emacs for versions less than 29.4-3
Details

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

References

Affected packages

Azure Linux:3 / emacs

Package

Name
emacs
Purl
pkg:rpm/azure-linux/emacs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
29.4-3

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-53558.json"