[Git][security-tracker-team/security-tracker][master] Update information for emacs and org-mode issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Mar 25 20:21:42 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f1bc4dec by Salvatore Bonaccorso at 2024-03-25T21:21:08+01:00
Update information for emacs and org-mode issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,19 +1,29 @@
CVE-2024-30205 (In Emacs before 29.3, Org mode considers contents of remote files to b ...)
- emacs 1:29.3+1-1 (bug #1067630)
+ - org-mode <unfixed> (bug #1067663)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00005.html
+ NOTE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=2bc865ace050ff118db43f01457f95f95112b877
+ NOTE: https://list.orgmode.org/87o7b3eczr.fsf@bzg.fr/T/#t
+ NOTE: https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=4255d5dcc0657915f90e4fba7e0a5514cced514d
CVE-2024-30204 (In Emacs before 29.3, LaTeX preview is enabled by default for e-mail a ...)
- emacs 1:29.3+1-1 (bug #1067630)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00005.html
+ NOTE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=6f9ea396f49cbe38c2173e0a72ba6af3e03b271c
CVE-2024-30203 (In Emacs before 29.3, Gnus treats inline MIME contents as trusted.)
- emacs 1:29.3+1-1 (bug #1067630)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00005.html
+ NOTE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=937b9042ad7426acdcca33e3d931d8f495bdd804
CVE-2024-30202 (In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turn ...)
- emacs 1:29.3+1-1 (bug #1067630)
+ - org-mode <unfixed> (bug #1067663)
NOTE: https://www.openwall.com/lists/oss-security/2024/03/24/1
NOTE: https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00005.html
+ NOTE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=befa9fcaae29a6c9a283ba371c3c5234c7f644eb
+ NOTE: https://list.orgmode.org/87o7b3eczr.fsf@bzg.fr/T/#t
+ NOTE: https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=003ddacf1c8d869b1858181c29ea21b731a8d8d9
CVE-2024-2865 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
TODO: check
CVE-2024-2864 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
@@ -339,9 +349,6 @@ CVE-2024-27280 [Buffer overread vulnerability in StringIO]
- ruby2.5 <removed>
NOTE: https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
TODO: check details
-CVE-2024-XXXX [arbitrary Elisp and LaTeX evaluation]
- - org-mode <unfixed> (bug #1067663)
- NOTE: https://list.orgmode.org/87o7b3eczr.fsf@bzg.fr/T/#t
CVE-2024-30161 (In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may acce ...)
- qt6-base <unfixed>
- qtbase-opensource-src <unfixed>
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1bc4dec097556a5052cc53fe6224f089f350e94
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1bc4dec097556a5052cc53fe6224f089f350e94
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240325/8ca64ff7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list