GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
{
"binaries": [
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24"
},
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24-bin-common"
},
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24-common"
},
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24-el"
},
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24-lucid"
},
{
"binary_version": "24.3+1-2ubuntu1.1",
"binary_name": "emacs24-nox"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24"
},
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24-bin-common"
},
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24-common"
},
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24-el"
},
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24-lucid"
},
{
"binary_version": "24.5+1-6ubuntu1.1",
"binary_name": "emacs24-nox"
}
],
"availability": "No subscription required"
}