vulnerability
Amazon Linux 2023: CVE-2024-30202: Important priority package update for emacs
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 03/25/2024 | 02/17/2025 | 02/17/2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
03/25/2024
Added
02/17/2025
Modified
02/17/2025
Description
In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.
A flaw was found in Emacs. Arbitrary Lisp code can be evaluated when an Org mode file is opened or when the Org mode is being enabled, resulting in arbitrary code execution.
A flaw was found in Emacs. Arbitrary Lisp code can be evaluated when an Org mode file is opened or when the Org mode is being enabled, resulting in arbitrary code execution.
Solution(s)
amazon-linux-2023-upgrade-emacsamazon-linux-2023-upgrade-emacs-commonamazon-linux-2023-upgrade-emacs-common-debuginfoamazon-linux-2023-upgrade-emacs-debuginfoamazon-linux-2023-upgrade-emacs-debugsourceamazon-linux-2023-upgrade-emacs-develamazon-linux-2023-upgrade-emacs-filesystemamazon-linux-2023-upgrade-emacs-lucidamazon-linux-2023-upgrade-emacs-lucid-debuginfoamazon-linux-2023-upgrade-emacs-noxamazon-linux-2023-upgrade-emacs-nox-debuginfoamazon-linux-2023-upgrade-emacs-terminal

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.