First published: Mon Mar 25 2024(Updated: )
GNU Emacs could provide weaker than expected security, caused by an issue with contents of remote files to be trusted in Org mode. A remote attacker could exploit this vulnerability to launch further attacks on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/emacs | <29.3 | 29.3 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 | |
debian/emacs | 1:27.1+1-3.1+deb11u5 1:27.1+1-3.1+deb11u6 1:28.2+1-15+deb12u3 1:28.2+1-15+deb12u4 1:30.1+1-3 | |
debian/org-mode | <=9.5.2+dfsh-5 | 9.4.0+dfsg-1+deb11u3 9.7.19+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30205 is classified as a medium severity vulnerability.
To mitigate CVE-2024-30205, upgrade to Emacs version 29.3 or later and Org Mode version 9.6.23 or later.
CVE-2024-30205 affects Emacs versions prior to 29.3 and Org Mode versions prior to 9.6.23.
CVE-2024-30205 exploits the trust placed in the contents of remote files in Emacs Org mode.
CVE-2024-30205 impacts users of Emacs in Red Hat and Debian distributions prior to the specified versions.