First published: Mon Feb 20 2023(Updated: )
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=28.2 | |
Debian Debian Linux | =11.0 | |
debian/emacs | 1:27.1+1-3.1+deb11u5 1:28.2+1-15+deb12u3 1:29.4+1-4 |
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48337 is a vulnerability in GNU Emacs that allows attackers to execute commands via shell metacharacters in the name of a source-code file.
GNU Emacs versions up to 28.2 and Debian Linux version 11.0 are affected by CVE-2022-48337.
CVE-2022-48337 has a severity rating of 9.8 (Critical).
Attackers can exploit CVE-2022-48337 by using shell metacharacters in the name of a source-code file to execute commands.
Yes, a fix is available. Users should update to the latest version of GNU Emacs or apply the recommended updates for Debian Linux.