Opened 12 years ago

Closed 12 years ago

Last modified 12 years ago

#36283 closed defect (fixed)

emacs23: CVE-2012-3479 security issue

Reported by: blair (Blair Zajac) Owned by: drkp (Dan Ports)
Priority: Normal Milestone:
Component: ports Version: 2.1.2
Keywords: Cc:
Port: emacs23

Description

There's a security issue in emacs23:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479

lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.

The patch here applies cleanly to the source:

http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155

Change History (2)

comment:1 Changed 12 years ago by blair (Blair Zajac)

Resolution: fixed
Status: newclosed

Fixed in r98021.

comment:2 Changed 12 years ago by drkp (Dan Ports)

Thanks. For the benefit of the archives, this isn't an issue for emacs/emacs-app because it's fixed in 24.2, and it didn't exist in emacs22.

Note: See TracTickets for help on using tickets.