In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
There is an upstream fix addressing this CVE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=b5158bd191422e46273c4d9412f2bf097e2da2e0
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:4787 https://access.redhat.com/errata/RHSA-2025:4787
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:4794 https://access.redhat.com/errata/RHSA-2025:4794
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:4793 https://access.redhat.com/errata/RHSA-2025:4793