Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-53920

Опубликовано: 27 нояб. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

A flaw was found in Emacs. Viewing or editing an untrusted Emacs Lisp source code file can cause arbitrary code execution due to unsafe macro expansion when a user has configured elisp-completion-at-point for code completion or has enabled automatic error checking, such as Flymake or Flycheck.

Отчет

To exploit this flaw, an attacker needs to trick a user into opening an Emacs Lisp source code file with a crafted macro definition. Additionally, the user must have elisp-completion-at-point configured or automatic error checking enabled. For these reasons, this flaw has been rated with a Moderate severity.

Меры по смягчению последствий

Do not open or view untrusted Emacs Lisp source code files. Disabling auto-completion features and automatic error checking such as Flymake or Flycheck in untrusted Emacs Lisp source code files will mitigate this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6emacsOut of support scope
Red Hat Enterprise Linux 7emacsOut of support scope
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:1103015.07.2025
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:1103015.07.2025
Red Hat Enterprise Linux 9emacsFixedRHSA-2025:478712.05.2025
Red Hat Enterprise Linux 9emacsFixedRHSA-2025:944824.06.2025
Red Hat Enterprise Linux 9.2 Extended Update SupportemacsFixedRHSA-2025:479412.05.2025
Red Hat Enterprise Linux 9.4 Extended Update SupportemacsFixedRHSA-2025:479312.05.2025
Red Hat Discovery 2discovery/discovery-server-rhel9FixedRHSA-2025:1148721.07.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2329161emacs: arbitrary code execution via Lisp macro expansion

EPSS

Процентиль: 15%
0.0005
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVSS3: 7.8
nvd
больше 1 года назад

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVSS3: 7.8
msrc
около 1 года назад

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVSS3: 7.8
debian
больше 1 года назад

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invok ...

suse-cvrf
около 1 года назад

Security update for emacs

EPSS

Процентиль: 15%
0.0005
Низкий

7.8 High

CVSS3