First published: Wed Nov 27 2024(Updated: )
In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=30.0.92 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53920 has been classified as a high severity vulnerability due to its ability to allow arbitrary code execution through unsafe Lisp macro expansion.
To fix CVE-2024-53920, users should update GNU Emacs to version 30.0.93 or later, where the issue has been resolved.
CVE-2024-53920 affects GNU Emacs versions up to and including 30.0.92.
CVE-2024-53920 is a code execution vulnerability that arises from unsafe macro expansion in Emacs Lisp.
Any user of GNU Emacs versions 30.0.92 or earlier who uses elisp-completion-at-point on untrusted Emacs Lisp source code is vulnerable to CVE-2024-53920.