Description
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5360-1 | emacs security update |
EUVD |
EUVD-2022-51038 | An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed. |
Ubuntu USN |
USN-7027-1 | Emacs vulnerabilities |
References
History
Tue, 18 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-18T15:21:22.243Z
Reserved: 2023-02-20T00:00:00.000Z
Link: CVE-2022-48338
Updated: 2024-08-03T15:10:59.720Z
Status : Modified
Published: 2023-02-20T23:15:12.297
Modified: 2025-03-18T16:15:14.863
Link: CVE-2022-48338
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN