Description
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3416-1 | emacs security update |
Debian DSA |
DSA-5360-1 | emacs security update |
EUVD |
EUVD-2022-51037 | GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. |
Ubuntu USN |
USN-7027-1 | Emacs vulnerabilities |
References
History
Tue, 18 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-18T15:30:23.044Z
Reserved: 2023-02-20T00:00:00.000Z
Link: CVE-2022-48337
Updated: 2024-08-03T15:10:59.761Z
Status : Modified
Published: 2023-02-20T23:15:12.243
Modified: 2025-03-18T16:15:14.647
Link: CVE-2022-48337
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN