MGASA-2024-0397

Source
https://advisories.mageia.org/MGASA-2024-0397.html
Import Source
https://advisories.mageia.org/MGASA-2024-0397.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0397
Related
Published
2024-12-24T08:06:56Z
Modified
2024-12-24T07:41:12Z
Summary
Updated emacs packages fix security vulnerability
Details

In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code). (CVE-2024-53920)

References
Credits

Affected packages

Mageia:9 / emacs

Package

Name
emacs
Purl
pkg:rpm/mageia/emacs?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
29.4-1.2.mga9

Ecosystem specific

{
    "section": "core"
}