CVE-2024-30205
Publication date 25 March 2024
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.
Status
Package | Ubuntu Release | Status |
---|---|---|
emacs | 25.04 plucky |
Not affected
|
24.10 oracular |
Not affected
|
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Fixed 1:27.1+1-3ubuntu5.2
|
|
20.04 LTS focal |
Fixed 1:26.3+1-1ubuntu2+esm1
|
|
emacs24 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
16.04 LTS xenial |
Fixed 24.5+1-6ubuntu1.1+esm4
|
|
emacs25 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 25.2+1-6ubuntu0.1~esm2
|
|
org-mode | 25.04 plucky |
Not affected
|
24.10 oracular |
Not affected
|
|
24.04 LTS noble |
Fixed 9.6.10+dfsg-1ubuntu0.1~esm1
|
|
22.04 LTS jammy |
Fixed 9.5.2+dfsh-4ubuntu0.1~esm1
|
|
20.04 LTS focal |
Fixed 9.3.1+dfsg-1ubuntu0.1~esm1
|
|
18.04 LTS bionic |
Fixed 9.1.6+dfsg-1ubuntu0.1~esm1
|
|
16.04 LTS xenial |
Not affected
|
|
xemacs21 | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
xemacs21-packages | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7027-1
- Emacs vulnerabilities
- 19 September 2024
- USN-7375-1
- Org Mode vulnerabilities
- 27 March 2025
Other references
- https://www.openwall.com/lists/oss-security/2024/03/24/1
- https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00005.html
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=2bc865ace050ff118db43f01457f95f95112b877
- https://list.orgmode.org/[email protected]/T/#t
- https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=4255d5dcc0657915f90e4fba7e0a5514cced514d
- https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29
- https://www.cve.org/CVERecord?id=CVE-2024-30205