Lucene search

K
amazonAmazonALAS-2024-2608
HistoryAug 01, 2024 - 3:01 a.m.

Important: emacs

2024-08-0103:01:00
alas.aws.amazon.com
4
emacs security vulnerabilities
emacs version 29.3
latex preview
org mode
remote file trust issue

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

Low

Issue Overview:

In Emacs before 29.3, Gnus treats inline MIME contents as trusted. (CVE-2024-30203)

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments. (CVE-2024-30204)

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23. (CVE-2024-30205)

In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(…) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5. (CVE-2024-39331)

Affected Packages:

emacs

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update emacs to update your system.

New Packages:

aarch64:  
    emacs-27.2-4.amzn2.0.5.aarch64  
    emacs-lucid-27.2-4.amzn2.0.5.aarch64  
    emacs-nox-27.2-4.amzn2.0.5.aarch64  
    emacs-common-27.2-4.amzn2.0.5.aarch64  
    emacs-devel-27.2-4.amzn2.0.5.aarch64  
    emacs-debuginfo-27.2-4.amzn2.0.5.aarch64  
  
i686:  
    emacs-27.2-4.amzn2.0.5.i686  
    emacs-lucid-27.2-4.amzn2.0.5.i686  
    emacs-nox-27.2-4.amzn2.0.5.i686  
    emacs-common-27.2-4.amzn2.0.5.i686  
    emacs-devel-27.2-4.amzn2.0.5.i686  
    emacs-debuginfo-27.2-4.amzn2.0.5.i686  
  
noarch:  
    emacs-terminal-27.2-4.amzn2.0.5.noarch  
    emacs-filesystem-27.2-4.amzn2.0.5.noarch  
  
src:  
    emacs-27.2-4.amzn2.0.5.src  
  
x86_64:  
    emacs-27.2-4.amzn2.0.5.x86_64  
    emacs-lucid-27.2-4.amzn2.0.5.x86_64  
    emacs-nox-27.2-4.amzn2.0.5.x86_64  
    emacs-common-27.2-4.amzn2.0.5.x86_64  
    emacs-devel-27.2-4.amzn2.0.5.x86_64  
    emacs-debuginfo-27.2-4.amzn2.0.5.x86_64  

Additional References

Red Hat: CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331

Mitre: CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

Low