First published: Tue Feb 21 2023(Updated: )
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. <a href="https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c">https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=28.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2171987 is categorized as moderate due to the potential for command execution via shell metacharacters.
To fix REDHAT-BUG-2171987, you should update GNU Emacs to version 28.3 or later, which addresses the vulnerability.
REDHAT-BUG-2171987 affects users of GNU Emacs versions up to and including 28.2.
REDHAT-BUG-2171987 is a command injection vulnerability, allowing attackers to execute arbitrary commands.
Yes, the vulnerability in REDHAT-BUG-2171987 can be exploited remotely if a victim runs a malicious command.