Package: emacs-common Version: 1:28.2+1-15 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
Hello, https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29 describes some security issues addressed in emacs 29.3. Among them: ** Gnus now treats inline MIME contents as untrusted. To get back previous insecure behavior, 'untrusted-content' should be reset to nil in the buffer. ** LaTeX preview is now by default disabled for email attachments. To get back previous insecure behavior, set the variable 'org--latex-preview-when-risky' to a non-nil value. I don't see anything that would explicitly indicate if the version in stable, 1.28.2, is vulnerable but the nature of this leads me to think that it is. Thanks, John -- System Information: Debian Release: 12.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 6.1.0-18-amd64 (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages emacs-common depends on: ii emacs-el 1:28.2+1-15 ii emacsen-common 3.0.5 ii init-system-helpers 1.65.2 ii install-info 6.8-6+b1 emacs-common recommends no packages. Versions of packages emacs-common suggests: pn emacs-common-non-dfsg <none> ii ncurses-term 6.4-4 -- no debconf information