First published: Sun Jun 23 2024(Updated: )
GNU Emacs could allow a remote attacker to execute arbitrary code on the system, caused by a code injection flaw in org-link-expand-abbrev in lisp/ol.el. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/emacs | <29.4 | 29.4 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 | |
debian/emacs | 1:27.1+1-3.1+deb11u5 1:27.1+1-3.1+deb11u6 1:28.2+1-15+deb12u3 1:28.2+1-15+deb12u4 1:30.1+1-3 | |
debian/org-mode | <=9.5.2+dfsh-5 | 9.4.0+dfsg-1+deb11u3 9.7.19+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39331 is considered a security vulnerability due to unsafe function execution in Emacs' org-link-expand-abbrev.
To fix CVE-2024-39331, upgrade Emacs to version 29.4 or Org Mode to version 9.7.5 or later.
Emacs versions prior to 29.4 are affected by CVE-2024-39331.
Org Mode versions before 9.7.5 are affected and should be updated to this version or later.
CVE-2024-39331 exploits the ability to expand unsafe function links in the org-link-expand-abbrev feature of Emacs.