Mageia 2024-0397: emacs Security Advisory Updates
Summary
In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to
invoke elisp-completion-at-point (for code completion) on untrusted
Emacs Lisp source code can trigger unsafe Lisp macro expansion that
allows attackers to execute arbitrary code. (This unsafe expansion also
occurs if a user chooses to enable on-the-fly diagnosis that byte
compiles untrusted Emacs Lisp source code). (CVE-2024-53920)
References
- https://bugs.mageia.org/show_bug.cgi?id=33867
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4KYDPPUCZHJVNAEXLQAF43YKVZPVWFH/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53920
Resolution
MGASA-2024-0397 - Updated emacs packages fix security vulnerability
SRPMS
- 9/core/emacs-29.4-1.2.mga9
![Dist Mageia](/images/distros/dist-mageia.jpg)