In elisp-mode.el in GNU Emacs through 30.0.92, a user who...
Unreviewed
Published
Nov 27, 2024
to the GitHub Advisory Database
•
Updated Nov 27, 2024
Description
Published by the National Vulnerability Database
Nov 27, 2024
Published to the GitHub Advisory Database
Nov 27, 2024
Last updated
Nov 27, 2024
In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
References