First published: Tue Nov 29 2022(Updated: )
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. Reference and upstream patch: <a href="https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51">https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=28.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2149380 is classified as high due to the potential for command execution by attackers.
To fix REDHAT-BUG-2149380, update GNU Emacs to version 28.3 or later where the vulnerability has been addressed.
The vulnerability REDHAT-BUG-2149380 affects all versions of GNU Emacs up to and including version 28.2.
The REDHAT-BUG-2149380 vulnerability allows attackers to execute arbitrary commands via shell metacharacters embedded in source-code file names.
As a workaround for REDHAT-BUG-2149380, avoid using the ctags command on untrusted source-code file names.