Description
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3257-1 | emacs security update |
Debian DSA |
DSA-5314-1 | emacs security update |
EUVD |
EUVD-2022-48781 | GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. |
Ubuntu USN |
USN-5781-1 | Emacs vulnerability |
Ubuntu USN |
USN-7027-1 | Emacs vulnerabilities |
References
History
Mon, 28 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-28T18:12:24.092Z
Reserved: 2022-11-28T00:00:00.000Z
Link: CVE-2022-45939
Updated: 2024-08-03T14:24:03.228Z
Status : Modified
Published: 2022-11-28T06:15:10.563
Modified: 2025-04-28T19:15:46.493
Link: CVE-2022-45939
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN