First published: Mon Feb 20 2023(Updated: )
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=28.2 | |
debian/emacs | 1:27.1+1-3.1+deb11u5 1:28.2+1-15+deb12u3 1:29.4+1-4 |
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48338 is a vulnerability discovered in GNU Emacs through version 28.2.
The severity of CVE-2022-48338 is high with a CVSS score of 7.3.
CVE-2022-48338 affects GNU Emacs versions up to 28.2.
Yes, a fix is available. Please refer to the references for more information.
You can find more information about CVE-2022-48338 in the provided references.