CVE-2024-53920

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
VendorProductVersion
gnuemacs
𝑥
< 30.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
emacs
bullseye
vulnerable
bullseye (security)
1:27.1+1-3.1+deb11u6
fixed
bookworm
1:28.2+1-15+deb12u4
fixed
bookworm (security)
1:28.2+1-15+deb12u4
fixed
sid
1:30.1+1-5
fixed
trixie
1:30.1+1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
emacs
plucky
needs-triage
oracular
needs-triage
noble
needs-triage
jammy
needs-triage
focal
needs-triage
emacs24
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
dne
xenial
needs-triage
emacs25
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
dne
bionic
needs-triage
xemacs21
plucky
needs-triage
oracular
needs-triage
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
xemacs21-packages
plucky
needs-triage
oracular
needs-triage
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage