
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-30204 affects Emacs versions before 29.3, where LaTeX preview is enabled by default for e-mail attachments. The vulnerability was discovered in March 2024 and affects various versions of the Emacs text editor (NVD, Debian LTS).
The vulnerability stems from LaTeX preview being enabled by default for email attachments with specific text/x-org mime type. The issue specifically affects GNUS and MUA clients re-using gnus libs (including notmuch and mu4e), but not rmail. The vulnerability has been assigned a CVSS 3.1 Base Score of 2.8 (LOW) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L (NVD).
When exploited, the vulnerability could allow specially designed LaTeX code to generate huge PDF or log files that may exhaust disk space, leading to a denial of service condition (Emacs Commit).
The vulnerability has been fixed in Emacs 29.3 by introducing a new variable 'org--latex-preview-when-risky' that controls LaTeX preview behavior for content from untrusted sources. As a workaround for systems that cannot be upgraded, users can disable LaTeX previews by setting 'org-preview-latex-default-process' to 'verbatim' (OSS Security).
The security community has discussed the nature of this vulnerability extensively, with some debate about whether it should be considered separate from CVE-2024-30203. Several developers have suggested that the CVE assignments could be merged as they address related issues (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."