* bug#75017: 31.0.50; Untrusted user lisp files
@ 2024-12-21 20:48 john muhl
2024-12-22 2:47 ` Stefan Kangas
2024-12-22 6:19 ` Eli Zaretskii
0 siblings, 2 replies; 13+ messages in thread
From: john muhl @ 2024-12-21 20:48 UTC (permalink / raw)
To: 75017
user-init-file is trusted by default but not other user files.
C-xf ~/.emacs.d/early-init.el
M-x flymake-mode
Produces a warning:
Disabling elisp-flymake-byte-compile in early-init.el (untrusted content)
custom-file (when not the same as user-init-file) also causes a
warning. Should these also be trusted by default?
What about files put in place by a system admin or your distro’s
Emacs package (e.g. site-run-file, default.el)? They generally
require root priviledges to install so if they can’t be trusted
you’re already in trouble.
In GNU Emacs 31.0.50 (build 87, x86_64-pc-linux-gnu, GTK+ Version
3.24.43, cairo version 1.18.2) of 2024-12-21 built on thelio
Repository revision: ff4fcfc92cd80c9dbc68855549102d07ef419268
Repository branch: master
System Description: Fedora
Linux 41 (Workstation Edition)
Configured using:
'configure --with-pgtk --prefix=/home/jm/opt'
Configured features:
ACL CAIRO DBUS FREETYPE GIF GLIB GMP GNUTLS GPM GSETTINGS HARFBUZZ
JPEG LIBOTF LIBSELINUX LIBSYSTEMD LIBXML2 MODULES NATIVE_COMP
NOTIFY INOTIFY PDUMPER PGTK PNG RSVG SECCOMP SOUND SQLITE3 THREADS
TIFF TOOLKIT_SCROLL_BARS TREE_SITTER WEBP XIM GTK3 ZLIB
Important settings:
value of $LANG: en_US.UTF-8
locale-coding-system: utf-8-unix
Major mode: ELisp/l
Minor modes in effect:
server-mode: t
bug-reference-prog-mode: t
bug-reference-mode: t
completion-preview-mode: t
outline-minor-mode: t
ruler-mode: t
winner-mode: t
savehist-mode: t
repeat-mode: t
midnight-mode: t
global-visual-wrap-prefix-mode: t
visual-wrap-prefix-mode: t
global-paren-face-mode: t
paren-face-mode: t
global-goto-address-mode: t
goto-address-mode: t
global-auto-revert-mode: t
electric-pair-mode: t
dynamic-completion-mode: t
desktop-save-mode: t
delete-selection-mode: t
auto-insert-mode: t
tooltip-mode: t
global-eldoc-mode: t
eldoc-mode: t
show-paren-mode: t
electric-quote-mode: t
electric-indent-mode: t
mouse-wheel-mode: t
tool-bar-mode: t
menu-bar-mode: t
file-name-shadow-mode: t
context-menu-mode: t
global-font-lock-mode: t
font-lock-mode: t
minibuffer-regexp-mode: t
column-number-mode: t
line-number-mode: t
transient-mark-mode: t
auto-composition-mode: t
auto-encryption-mode: t
auto-compression-mode: t
auto-save-visited-mode: t
Load-path shadows:
None found.
Features:
(shadow sort mail-extr emacsbug magit-utils crm dash misearch
multi-isearch texinfo texinfo-loaddefs tex-mode compare-w
make-mode css-mode smie sgml-mode facemenu imenu eww vtable
url-queue shr pixel-fill kinsoku url-file svg xml dom mm-url gnus
message sendmail yank-media puny rfc822 mml mml-sec epa epg
rfc6068 epg-config mm-decode mm-bodies mm-encode mail-parse
rfc2231 rfc2047 rfc2045 ietf-drums mailabbrev gmm-utils mailheader
nnheader gnus-util mail-utils range mm-util mail-prsvr color
python skeleton cc-mode cc-fonts cc-guess cc-menus cc-cmds
cc-styles cc-align cc-engine cc-langs cc-vars cc-defs cc-bytecomp
c++-ts-mode c-ts-mode c-ts-common mule-util dired-aux dired-x
dired dired-loaddefs lua-ts-mode treesit flymake server warnings
tabify fennel-mode xref project inf-lisp shell pcomplete shortdoc
help-fns radix-tree cl-print debug backtrace find-func apropos
cursor-sensor compile text-property-search comint ansi-osc
ansi-color comp-run comp-common smerge-mode diff disp-table
whitespace emacs-news-mode time-date vc-git diff-mode
track-changes derived files-x vc-dir ewoc vc vc-dispatcher
bug-reference completion-preview easy-mmode pcase noutline outline
ruler-mode specter-theme auth-source-pass winner ring savehist
repeat midnight visual-wrap paren-face compat goto-addr thingatpt
cl-extra help-mode autorevert filenotify elec-pair completion
desktop frameset delsel autoinsert cus-start time init
fennel-mode-autoloads magit-autoloads git-commit-autoloads
dash-autoloads magit-section-autoloads paren-face-autoloads
finder-inf info with-editor-autoloads xr-autoloads package
browse-url xdg url url-proxy url-expand url-methods url-history
url-cookie generate-lisp-file url-domsuf url-util mailcap
url-handlers url-parse auth-source cl-seq eieio eieio-core cl-macs
password-cache json map byte-opt gv bytecomp byte-compile
url-privacy url-vars early-init rx subr-x cus-edit pp cus-load
icons wid-edit cl-loaddefs cl-lib rmc iso-transl tooltip cconv
eldoc paren electric uniquify ediff-hook vc-hooks lisp-float-type
elisp-mode mwheel term/pgtk-win pgtk-win term/common-win
touch-screen pgtk-dnd tool-bar dnd fontset image regexp-opt fringe
tabulated-list replace newcomment text-mode lisp-mode prog-mode
register page tab-bar menu-bar rfn-eshadow isearch easymenu timer
select scroll-bar mouse jit-lock font-lock syntax font-core
term/tty-colors frame minibuffer nadvice seq simple cl-generic
indonesian philippine cham georgian utf-8-lang misc-lang
vietnamese tibetan thai tai-viet lao korean japanese eucjp-ms
cp51932 hebrew greek romanian slovak czech european ethiopic
indian cyrillic chinese composite emoji-zwj charscript charprop
case-table epa-hook jka-cmpr-hook help abbrev obarray oclosure
cl-preloaded button loaddefs theme-loaddefs faces cus-face
macroexp files window text-properties overlay sha1 md5 base64
format env code-pages mule custom widget keymap
hashtable-print-readable backquote threads dbusbind inotify
dynamic-setting system-font-setting font-render-setting cairo gtk
pgtk multi-tty move-toolbar make-network-process tty-child-frames
native-compile emacs)
Memory information:
((conses 16 4219242 387989) (symbols 48 31297 4)
(strings 32 279165 15056) (string-bytes 1 12853103)
(vectors 16 57830) (vector-slots 8 656011 595942) (floats 8 646 3216)
(intervals 56 848446 3470) (buffers 992 79))
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-21 20:48 bug#75017: 31.0.50; Untrusted user lisp files john muhl
@ 2024-12-22 2:47 ` Stefan Kangas
2024-12-22 3:16 ` Stefan Monnier via Bug reports for GNU Emacs, the Swiss army knife of text editors
2024-12-22 6:19 ` Eli Zaretskii
1 sibling, 1 reply; 13+ messages in thread
From: Stefan Kangas @ 2024-12-22 2:47 UTC (permalink / raw)
To: john muhl, 75017; +Cc: Eli Zaretskii, Andrea Corallo, Stefan Monnier
john muhl <jm@pub.pink> writes:
> user-init-file is trusted by default but not other user files.
>
> C-xf ~/.emacs.d/early-init.el
> M-x flymake-mode
>
> Produces a warning:
>
> Disabling elisp-flymake-byte-compile in early-init.el (untrusted content)
>
> custom-file (when not the same as user-init-file) also causes a
> warning. Should these also be trusted by default?
>
> What about files put in place by a system admin or your distro’s
> Emacs package (e.g. site-run-file, default.el)? They generally
> require root priviledges to install so if they can’t be trusted
> you’re already in trouble.
Makes sense to me.
Maybe we should install something like the below?
diff --git a/lisp/files.el b/lisp/files.el
index c92fc0608dd..293f3c59c0d 100644
--- a/lisp/files.el
+++ b/lisp/files.el
@@ -748,10 +748,16 @@ trusted-content-p
(with-demoted-errors "trusted-content-p: %S"
(let ((exists (file-exists-p buffer-file-truename)))
(or
- ;; We can't avoid trusting the user's init file.
- (if (and exists user-init-file)
- (file-equal-p buffer-file-truename user-init-file)
- (equal buffer-file-truename user-init-file))
+ ;; We can't avoid trusting the user's init file, etc.
+ (memq t
+ (mapcar
+ (lambda (file)
+ (if (and exists file)
+ (file-equal-p buffer-file-truename file)
+ (equal buffer-file-truename file)))
+ (list user-init-file
+ early-init-file
+ site-run-file)))
(let ((file (abbreviate-file-name buffer-file-truename))
(trusted nil))
(dolist (tf trusted-content)
^ permalink raw reply related [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 2:47 ` Stefan Kangas
@ 2024-12-22 3:16 ` Stefan Monnier via Bug reports for GNU Emacs, the Swiss army knife of text editors
2024-12-22 6:12 ` Eli Zaretskii
0 siblings, 1 reply; 13+ messages in thread
From: Stefan Monnier via Bug reports for GNU Emacs, the Swiss army knife of text editors @ 2024-12-22 3:16 UTC (permalink / raw)
To: Stefan Kangas; +Cc: Andrea Corallo, Eli Zaretskii, john muhl, 75017
> Maybe we should install something like the below?
Fine by me, but I think this should be added via a new
`trusted-content-function(s)` and added buffer-locally only in
elisp-mode buffers.
Stefan
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 3:16 ` Stefan Monnier via Bug reports for GNU Emacs, the Swiss army knife of text editors
@ 2024-12-22 6:12 ` Eli Zaretskii
2024-12-22 17:36 ` Stefan Kangas
0 siblings, 1 reply; 13+ messages in thread
From: Eli Zaretskii @ 2024-12-22 6:12 UTC (permalink / raw)
To: Stefan Monnier; +Cc: acorallo, jm, stefankangas, 75017
> From: Stefan Monnier <monnier@iro.umontreal.ca>
> Cc: john muhl <jm@pub.pink>, 75017@debbugs.gnu.org, Eli Zaretskii
> <eliz@gnu.org>, Andrea Corallo <acorallo@gnu.org>
> Date: Sat, 21 Dec 2024 22:16:05 -0500
>
> > Maybe we should install something like the below?
>
> Fine by me, but I think this should be added via a new
> `trusted-content-function(s)` and added buffer-locally only in
> elisp-mode buffers.
Sorry, but this is slippery slope. For starters, no one said that
site-run-file is installed by a sysadmin -- that is only so on certain
systems. For example, MS-Windows is generally not in that category.
More generally, if we go this way, i.e. every complaint by some user
about a file that _could_ be trusted, or even is trusted on a group of
systems, causes us to add more and more files and directories to the
trusted list, there will be no end to this, and, significantly, Emacs
30 will never be released.
So from where I stand, what we have now on the latest emacs-30 branch
is as good and as far as it gets, at least for Emacs 30. My
suggestion to anyone who wants additional files/directories to vet to
please use the existing facilities to add them to the trusted list.
This way, we collect experience and data points regarding which
files/directories and under what conditions should be trusted, and can
improve what we have now in the future. At that future time we should
probably ask users to name the files and directories they needed to
add to the trusted list, and take it from there, making changes which
will take that into account.
If you still insist on installing such changes at this time, please do
that on master. My preference is to wait with this until we have
enough experience with what we have, which means not before Emacs 30.1
is released and a couple of months go by. But if people insist on
installing now on master, I won't object.
Thanks.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-21 20:48 bug#75017: 31.0.50; Untrusted user lisp files john muhl
2024-12-22 2:47 ` Stefan Kangas
@ 2024-12-22 6:19 ` Eli Zaretskii
2024-12-22 17:20 ` Stefan Kangas
1 sibling, 1 reply; 13+ messages in thread
From: Eli Zaretskii @ 2024-12-22 6:19 UTC (permalink / raw)
To: john muhl; +Cc: 75017
> From: john muhl <jm@pub.pink>
> Date: Sat, 21 Dec 2024 14:48:52 -0600
>
> user-init-file is trusted by default but not other user files.
>
> C-xf ~/.emacs.d/early-init.el
> M-x flymake-mode
>
> Produces a warning:
>
> Disabling elisp-flymake-byte-compile in early-init.el (untrusted content)
>
> custom-file (when not the same as user-init-file) also causes a
> warning. Should these also be trusted by default?
No, not IMO. Please add those files you know you can trust to the
list of trusted files, and let's see if that works well for you. If,
after you have used that for some time, you have observations to
report or changes to suggest, please do, but let's please base such
observations on some sufficiently significant (read: long enough)
experience.
> What about files put in place by a system admin or your distro’s
> Emacs package (e.g. site-run-file, default.el)? They generally
> require root priviledges to install so if they can’t be trusted
> you’re already in trouble.
On my system, these files do not need any admin privileges, so I don't
think we should trust them by default. Users who know that these
files are modified only by trusted admins can and probably should add
them to the list of trusted files, if they need that (in general,
there should be no need to run Flymake in those files, in which case
these files don't need to be added even if they are trusted).
Btw, if we are talking about trusted admins, then entire directories
should be trusted, for example /usr/share or /usr/share/emacs.
There's a reason why we didn't do that by default.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 6:19 ` Eli Zaretskii
@ 2024-12-22 17:20 ` Stefan Kangas
2024-12-22 18:38 ` Eli Zaretskii
0 siblings, 1 reply; 13+ messages in thread
From: Stefan Kangas @ 2024-12-22 17:20 UTC (permalink / raw)
To: Eli Zaretskii, john muhl; +Cc: 75017
Eli Zaretskii <eliz@gnu.org> writes:
>> From: john muhl <jm@pub.pink>
>> Date: Sat, 21 Dec 2024 14:48:52 -0600
>>
>> user-init-file is trusted by default but not other user files.
>>
>> C-xf ~/.emacs.d/early-init.el
>> M-x flymake-mode
>>
>> Produces a warning:
>>
>> Disabling elisp-flymake-byte-compile in early-init.el (untrusted content)
>>
>> custom-file (when not the same as user-init-file) also causes a
>> warning. Should these also be trusted by default?
>
> No, not IMO. Please add those files you know you can trust to the
> list of trusted files, and let's see if that works well for you. If,
> after you have used that for some time, you have observations to
> report or changes to suggest, please do, but let's please base such
> observations on some sufficiently significant (read: long enough)
> experience.
>
>> What about files put in place by a system admin or your distro’s
>> Emacs package (e.g. site-run-file, default.el)? They generally
>> require root priviledges to install so if they can’t be trusted
>> you’re already in trouble.
>
> On my system, these files do not need any admin privileges, so I don't
> think we should trust them by default. Users who know that these
> files are modified only by trusted admins can and probably should add
> them to the list of trusted files, if they need that (in general,
> there should be no need to run Flymake in those files, in which case
> these files don't need to be added even if they are trusted).
I don't think it's meaningful to consider them as not
`trusted-content-p`, when we automatically load these files into any
running Emacs session.
> Btw, if we are talking about trusted admins, then entire directories
> should be trusted, for example /usr/share or /usr/share/emacs.
Yes, though we'd have to discuss which directories those are;
`load-path` and `source-directory` are two candidates.
> There's a reason why we didn't do that by default.
My understanding is that we just didn't consider all of these cases.
At least I didn't.
If others did, it wasn't sufficiently explicit for me to notice.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 6:12 ` Eli Zaretskii
@ 2024-12-22 17:36 ` Stefan Kangas
2024-12-22 18:41 ` Eli Zaretskii
0 siblings, 1 reply; 13+ messages in thread
From: Stefan Kangas @ 2024-12-22 17:36 UTC (permalink / raw)
To: Eli Zaretskii, Stefan Monnier; +Cc: acorallo, jm, 75017
Eli Zaretskii <eliz@gnu.org> writes:
>> From: Stefan Monnier <monnier@iro.umontreal.ca>
>> Cc: john muhl <jm@pub.pink>, 75017@debbugs.gnu.org, Eli Zaretskii
>> <eliz@gnu.org>, Andrea Corallo <acorallo@gnu.org>
>> Date: Sat, 21 Dec 2024 22:16:05 -0500
>>
>> > Maybe we should install something like the below?
>>
>> Fine by me, but I think this should be added via a new
>> `trusted-content-function(s)` and added buffer-locally only in
>> elisp-mode buffers.
>
> Sorry, but this is slippery slope. For starters, no one said that
> site-run-file is installed by a sysadmin -- that is only so on certain
> systems. For example, MS-Windows is generally not in that category.
It doesn't matter who can edit it. `site-run-file` is already trusted,
since it is loaded at run-time before `user-init-file`.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 17:20 ` Stefan Kangas
@ 2024-12-22 18:38 ` Eli Zaretskii
2024-12-22 19:52 ` Dmitry Gutov
0 siblings, 1 reply; 13+ messages in thread
From: Eli Zaretskii @ 2024-12-22 18:38 UTC (permalink / raw)
To: Stefan Kangas; +Cc: jm, 75017
> From: Stefan Kangas <stefankangas@gmail.com>
> Date: Sun, 22 Dec 2024 17:20:13 +0000
> Cc: 75017@debbugs.gnu.org
>
> Eli Zaretskii <eliz@gnu.org> writes:
>
> > No, not IMO. Please add those files you know you can trust to the
> > list of trusted files, and let's see if that works well for you. If,
> > after you have used that for some time, you have observations to
> > report or changes to suggest, please do, but let's please base such
> > observations on some sufficiently significant (read: long enough)
> > experience.
> >
> >> What about files put in place by a system admin or your distro’s
> >> Emacs package (e.g. site-run-file, default.el)? They generally
> >> require root priviledges to install so if they can’t be trusted
> >> you’re already in trouble.
> >
> > On my system, these files do not need any admin privileges, so I don't
> > think we should trust them by default. Users who know that these
> > files are modified only by trusted admins can and probably should add
> > them to the list of trusted files, if they need that (in general,
> > there should be no need to run Flymake in those files, in which case
> > these files don't need to be added even if they are trusted).
>
> I don't think it's meaningful to consider them as not
> `trusted-content-p`, when we automatically load these files into any
> running Emacs session.
No, we don't load anything. It's the user who tells us whether to
load these files, by placing them in those locations and naming them
according to what Emacs looks for. It's up to the user to tell us
whether everything in those files is trustworthy.
And let's not forget that various packages write to the init files, so
not everything there was written by the user.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 17:36 ` Stefan Kangas
@ 2024-12-22 18:41 ` Eli Zaretskii
2024-12-22 18:47 ` Drew Adams via Bug reports for GNU Emacs, the Swiss army knife of text editors
0 siblings, 1 reply; 13+ messages in thread
From: Eli Zaretskii @ 2024-12-22 18:41 UTC (permalink / raw)
To: Stefan Kangas; +Cc: acorallo, jm, monnier, 75017
> From: Stefan Kangas <stefankangas@gmail.com>
> Date: Sun, 22 Dec 2024 17:36:15 +0000
> Cc: jm@pub.pink, 75017@debbugs.gnu.org, acorallo@gnu.org
>
> Eli Zaretskii <eliz@gnu.org> writes:
>
> >> From: Stefan Monnier <monnier@iro.umontreal.ca>
> >> Cc: john muhl <jm@pub.pink>, 75017@debbugs.gnu.org, Eli Zaretskii
> >> <eliz@gnu.org>, Andrea Corallo <acorallo@gnu.org>
> >> Date: Sat, 21 Dec 2024 22:16:05 -0500
> >>
> >> > Maybe we should install something like the below?
> >>
> >> Fine by me, but I think this should be added via a new
> >> `trusted-content-function(s)` and added buffer-locally only in
> >> elisp-mode buffers.
> >
> > Sorry, but this is slippery slope. For starters, no one said that
> > site-run-file is installed by a sysadmin -- that is only so on certain
> > systems. For example, MS-Windows is generally not in that category.
>
> It doesn't matter who can edit it. `site-run-file` is already trusted,
> since it is loaded at run-time before `user-init-file`.
It is loaded if it is there. On my system, there's no such file, and
I don't expect to have it. So if such a file somehow materializes
there, I want to know, pronto.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 18:41 ` Eli Zaretskii
@ 2024-12-22 18:47 ` Drew Adams via Bug reports for GNU Emacs, the Swiss army knife of text editors
0 siblings, 0 replies; 13+ messages in thread
From: Drew Adams via Bug reports for GNU Emacs, the Swiss army knife of text editors @ 2024-12-22 18:47 UTC (permalink / raw)
To: Eli Zaretskii, Stefan Kangas
Cc: acorallo@gnu.org, monnier@iro.umontreal.ca, jm@pub.pink,
75017@debbugs.gnu.org
(Apologies for not following this thread.)
If this is about Emacs claiming/suggesting
that something is trusted or untrusted, I'd
say we're better off saying only that Emacs
CANNOT vouch for the thing to be trusted.
That's better than claiming that something
can't be trusted. And it's _much_ better
than claiming that something _can_ be trusted.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 18:38 ` Eli Zaretskii
@ 2024-12-22 19:52 ` Dmitry Gutov
2024-12-22 20:23 ` Eli Zaretskii
0 siblings, 1 reply; 13+ messages in thread
From: Dmitry Gutov @ 2024-12-22 19:52 UTC (permalink / raw)
To: Eli Zaretskii, Stefan Kangas; +Cc: jm, 75017
On 22/12/2024 20:38, Eli Zaretskii wrote:
> And let's not forget that various packages write to the init files, so
> not everything there was written by the user.
And Emacs will load whatever's written there on the next restart.
Whether the user wrote to those files, or someone else.
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 19:52 ` Dmitry Gutov
@ 2024-12-22 20:23 ` Eli Zaretskii
2024-12-22 20:27 ` Dmitry Gutov
0 siblings, 1 reply; 13+ messages in thread
From: Eli Zaretskii @ 2024-12-22 20:23 UTC (permalink / raw)
To: Dmitry Gutov; +Cc: jm, stefankangas, 75017
> Date: Sun, 22 Dec 2024 21:52:28 +0200
> Cc: jm@pub.pink, 75017@debbugs.gnu.org
> From: Dmitry Gutov <dmitry@gutov.dev>
>
> On 22/12/2024 20:38, Eli Zaretskii wrote:
> > And let's not forget that various packages write to the init files, so
> > not everything there was written by the user.
>
> And Emacs will load whatever's written there on the next restart.
> Whether the user wrote to those files, or someone else.
Yes, and your point is..?
^ permalink raw reply [flat|nested] 13+ messages in thread
* bug#75017: 31.0.50; Untrusted user lisp files
2024-12-22 20:23 ` Eli Zaretskii
@ 2024-12-22 20:27 ` Dmitry Gutov
0 siblings, 0 replies; 13+ messages in thread
From: Dmitry Gutov @ 2024-12-22 20:27 UTC (permalink / raw)
To: Eli Zaretskii; +Cc: jm, stefankangas, 75017
On 22/12/2024 22:23, Eli Zaretskii wrote:
>> And Emacs will load whatever's written there on the next restart.
>> Whether the user wrote to those files, or someone else.
> Yes, and your point is..?
That whatever malicious code we try to protect against using the
"trusted content" mechanism would be executed anyway.
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2024-12-22 20:27 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-12-21 20:48 bug#75017: 31.0.50; Untrusted user lisp files john muhl
2024-12-22 2:47 ` Stefan Kangas
2024-12-22 3:16 ` Stefan Monnier via Bug reports for GNU Emacs, the Swiss army knife of text editors
2024-12-22 6:12 ` Eli Zaretskii
2024-12-22 17:36 ` Stefan Kangas
2024-12-22 18:41 ` Eli Zaretskii
2024-12-22 18:47 ` Drew Adams via Bug reports for GNU Emacs, the Swiss army knife of text editors
2024-12-22 6:19 ` Eli Zaretskii
2024-12-22 17:20 ` Stefan Kangas
2024-12-22 18:38 ` Eli Zaretskii
2024-12-22 19:52 ` Dmitry Gutov
2024-12-22 20:23 ` Eli Zaretskii
2024-12-22 20:27 ` Dmitry Gutov
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/emacs.git
https://git.savannah.gnu.org/cgit/emacs/org-mode.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.