Bug 2293942 (CVE-2024-39331)
| Summary: | CVE-2024-39331 emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | fweimer |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | emacs 29.4 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2293944 | ||
| Bug Blocks: | 2293945 | ||
|
Description
Avinash Hanwate
2024-06-24 13:38:43 UTC
Created emacs tracking bugs for this issue: Affects: fedora-all [bug 2293944] This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4971 https://access.redhat.com/errata/RHSA-2024:4971 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6203 https://access.redhat.com/errata/RHSA-2024:6203 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:6510 https://access.redhat.com/errata/RHSA-2024:6510 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:6987 https://access.redhat.com/errata/RHSA-2024:6987 |