-Copyright 2022-2024 Eshel Yaron
+Copyright 2022-2025 Eshel Yaron
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
;;; esy-publish.el --- Simple Static Site Generator -*- lexical-binding:t -*-
-;; Copyright (C) 2023-2024 Eshel Yaron
+;; Copyright (C) 2023-2025 Eshel Yaron
;; Author: Eshel Yaron <me@eshelyaron.com>
;; Maintainer: Eshel Yaron <me@eshelyaron.com>
(class . "footer"))
(hr nil)
"© "
- (time ((class . "copyright-year")) "2024")
+ (time ((class . "copyright-year")) "2025")
" Eshel Yaron"))))
"--output")))
(apply #'call-process "texi2any" nil nil nil
(class . "footer"))
(hr nil)
"© "
- (time ((class . "copyright-year")) "2024")
+ (time ((class . "copyright-year")) "2025")
" %a"))))))))
(org-publish "all" force)
(dolist (buffer (seq-uniq
In addition, Emacs ships with several built-in macros that actually do
execute arbitrary code by /evaluating/ some of their arguments, no
questions asked. These macros are ~static-if~, ~rx~, ~cl-eval-when~,
-~eval-when-compile~, ~eval-and-compile~, and perhaps others.
+~eval-when-compile~, ~eval-and-compile~, ~cl-macrolet~, and perhaps
+others.
Therefore, if we can nudge Emacs to expand one of these macros, we get
arbitrary code execution. That's the crux of this vulnerability.
sadly, still stands. AFAICT the earliest public discussion about the
security implications of Emacs Lisp macros started in August 2018,
when [[https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg@mail.gmail.com/][Wilfred Hughes noted]] that code completion can lead to arbitrary
-code execution via macro-expansion. In October 2019, [[https://yhetil.org/emacs/CAJw81da4=R1jMJ0enx6SbO7G1rzaL61K2kqbY+jxhe=AM-3vtQ@mail.gmail.com/][Adam Plaice
+code execution via macro-expansion. In October 2019, [[https://debbugs.gnu.org/cgi/bugreport.cgi?bug=37656][Adam Plaice
reported]] that Flymake specifically can be used in a similar exploit.
Some solutions have been floated in the discussions following these
reports, but unfortunately, Emacs remains vulnerable to this very day.