Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
https://security.gentoo.org/glsa/201812-05
http://www.ubuntu.com/usn/USN-1586-1
http://www.mandriva.com/security/advisories?name=MDVSA-2013:076
http://sourceforge.net/mailarchive/message.php?msg_id=28657612
http://sourceforge.net/mailarchive/message.php?msg_id=28649762
http://secunia.com/advisories/50801
http://secunia.com/advisories/47515
http://secunia.com/advisories/47311
http://openwall.com/lists/oss-security/2012/01/10/4
http://openwall.com/lists/oss-security/2012/01/10/2
http://lists.gnu.org/archive/html/emacs-devel/2012-01/msg00387.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072288.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072285.html