First published: Mon Mar 25 2024(Updated: )
GNU Emacs could provide weaker than expected security, caused by an issue with LaTeX preview is enabled by default for e-mail attachments. A remote attacker could exploit this vulnerability to launch further attacks on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/emacs | <29.3 | 29.3 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 | |
debian/emacs | 1:27.1+1-3.1+deb11u5 1:27.1+1-3.1+deb11u6 1:28.2+1-15+deb12u3 1:28.2+1-15+deb12u4 1:30.1+1-3 | |
debian/org-mode | <=9.5.2+dfsh-5 | 9.4.0+dfsg-1+deb11u3 9.7.19+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30204 is classified as a moderate severity vulnerability.
To fix CVE-2024-30204, upgrade to Emacs version 29.3 or later.
CVE-2024-30204 affects all versions of Emacs prior to 29.3.
CVE-2024-30204 may expose users to potential security risks through LaTeX previews enabled by default for e-mail attachments.
The vulnerable software packages include Emacs versions prior to 29.3 and certain versions of Org-mode.