----------------------------------------------------------------------------------
@MSGID:
<7b6bdbad-1170-1170-975d-56093cc96751@canonical.com> ca726998
@REPLYADDR Ian Constantin
<ian.constantin@canonical.com>
@REPLYTO 2:5075/128 Ian Constantin
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<7b6bdbad-1170-1170-975d-56093cc96751@canonical.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============5339852339555671451=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: 0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6003-1
April 06, 2023
emacs24 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Emacs could be made to run programs as your login if it received
specially crafted input.
Software Description:
- emacs24: GNU Emacs editor
Details:
Xi Lu discovered that Emacs did not properly handle certain
inputs. An attacker could possibly use this issue to execute
arbitrary commands.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
emacs24 24.5+1-6ubuntu1.1+esm3
emacs24-common 24.5+1-6ubuntu1.1+esm3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6003-1
CVE-2023-28617
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441