#36283 closed defect (fixed)
emacs23: CVE-2012-3479 security issue
Reported by: | blair (Blair Zajac) | Owned by: | drkp (Dan Ports) |
---|---|---|---|
Priority: | Normal | Milestone: | |
Component: | ports | Version: | 2.1.2 |
Keywords: | Cc: | ||
Port: | emacs23 |
Description
There's a security issue in emacs23:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479
lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
The patch here applies cleanly to the source:
Change History (2)
comment:1 Changed 12 years ago by blair (Blair Zajac)
Resolution: | → fixed |
---|---|
Status: | new → closed |
comment:2 Changed 12 years ago by drkp (Dan Ports)
Thanks. For the benefit of the archives, this isn't an issue for emacs/emacs-app because it's fixed in 24.2, and it didn't exist in emacs22.
Note: See
TracTickets for help on using
tickets.
Fixed in r98021.