{"id":"USN-5781-1","summary":"emacs24 vulnerability","details":"It was discovered that Emacs did not properly manage certain inputs.\nAn attacker could possibly use this issue to execute arbitrary commands.\n","modified":"2026-05-20T16:06:06.165333635Z","published":"2022-12-14T18:52:04Z","related":["UBUNTU-CVE-2022-45939"],"upstream":["CVE-2022-45939","UBUNTU-CVE-2022-45939"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5781-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45939"}],"affected":[{"package":{"name":"emacs24","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/emacs24?arch=source&distro=esm-apps%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"24.5+1-6ubuntu1.1+esm1"}]}],"versions":["24.5+1-1ubuntu2","24.5+1-1ubuntu4","24.5+1-1ubuntu5","24.5+1-1ubuntu6","24.5+1-1ubuntu7","24.5+1-6ubuntu1","24.5+1-6ubuntu1.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"emacs24-bin-common","binary_version":"24.5+1-6ubuntu1.1+esm1"},{"binary_name":"emacs24-lucid","binary_version":"24.5+1-6ubuntu1.1+esm1"},{"binary_name":"emacs24","binary_version":"24.5+1-6ubuntu1.1+esm1"},{"binary_name":"emacs24-el","binary_version":"24.5+1-6ubuntu1.1+esm1"},{"binary_name":"emacs24-nox","binary_version":"24.5+1-6ubuntu1.1+esm1"},{"binary_name":"emacs24-common","binary_version":"24.5+1-6ubuntu1.1+esm1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5781-1.json"}}],"schema_version":"1.7.5"}