|
|
Log in / Subscribe / Register

Ubuntu alert USN-8011-1 (emacs)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8011-1] Emacs vulnerabilities
Date:  Wed, 04 Feb 2026 13:50:00 +0000
Message-ID:  <E1vndGa-0006IL-Ph@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8011-1 February 04, 2026 emacs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in Emacs. Software Description: - emacs: An extensible, customizable, free/libre text editor — and more. Details: It was discovered that Emacs could trigger unsafe Lisp macro expansion, when a user invoked elisp-completion-at-point on untrusted Emacs Lisp source code. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-53920) It was discovered that Emacs did not properly sanitize input when handling certain URI schemes. An attacker could possibly use this issue to execute arbitrary shell commands by tricking a user into opening a specially crafted URL. (CVE-2025-1244) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS emacs 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-bin-common 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-common 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-el 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-gtk 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-lucid 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-nox 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro emacs-pgtk 1:29.3+1-1ubuntu2+esm3 Available with Ubuntu Pro Ubuntu 22.04 LTS emacs 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-bin-common 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-common 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-el 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-gtk 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-lucid 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro emacs-nox 1:27.1+1-3ubuntu5.2+esm1 Available with Ubuntu Pro Ubuntu 20.04 LTS emacs 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-bin-common 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-common 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-el 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-gtk 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-lucid 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro emacs-nox 1:26.3+1-1ubuntu2+esm2 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8011-1 CVE-2024-53920, CVE-2025-1244


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmDTkwACgkQcpJm3tlz hgG/JQ//eyVumg+DI1vb6F5RenMw5UlsIWGoghP3Rpu1+6k7/HGLreVRYAP/mMxi FaLfbmEFjqNQOMRPzHskyEVlT0/BhM4xtgEJNDwzyU0eyVDvu9tA9Aej/Kbgp3+/ sYXBDYdCTKGD6FGSnGb2a9896EuxCycUjAIxrJnFvmiYhCA85T8I1IjLzEJp68D1 yJfdvlZiff/wneZ1evTVjOfOI0BNbYmWLZX9z0vWaQMUvE2J8IHaS8mIEYDvagSx 7VISXWC1zj8LLRav/IGMtqPQOKIxtUmJxPuj0469r8l77x/gbjHFb8M+VpsJGAmk 8sNwyxflJCWPZrmXwAWLF7tpwQVOJn++rIf9uTnlsLd7ug3PrMQlk3M9saZfRJ+w DiKaFIBgCK208BzGfktwfeMBpd3p+Byuz+EhU72jiI3UWo+l72Rbpjeie/K0V2gl kphiUnzmkaCyQItYweKFpiSfxKjyxhBXGqeHqoxy6Z3mTkIrshIxoLpbXoZyjN9H Orx9EOAgmiLL+dwwLbfGnPNvc9/pcyq3KU7Y9VS5gsXSir4mM/OjaBKGb8CH/Pvt hEC071L7vtonuB5eAQZSyT3Yn2XkYPnglFhQt3PTgSs7dLjWeNZqFnlTYqUm7Leh 35IJcxGmWWMUgqAD/1FuyPdwEOAlqipWkTC2799VuU4n/rRvjzs= =aSYT -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds