ALT-PU-2023-5762-2
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51
- [debian-lts-announce] 20221231 [SECURITY] [DLA 3257-1] emacs security update
- [debian-lts-announce] 20221231 [SECURITY] [DLA 3257-1] emacs security update
- FEDORA-2022-e37f239f2e
- FEDORA-2022-e37f239f2e
- FEDORA-2022-d69c7f95a4
- FEDORA-2022-d69c7f95a4
- DSA-5314
- DSA-5314
Modified: 2025-03-18
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c
- [debian-lts-announce] 20230509 [SECURITY] [DLA 3416-1] emacs security update
- [debian-lts-announce] 20230509 [SECURITY] [DLA 3416-1] emacs security update
- FEDORA-2023-29df561f1d
- FEDORA-2023-29df561f1d
- FEDORA-2023-5763445abe
- FEDORA-2023-5763445abe
- DSA-5360
- DSA-5360
Modified: 2025-03-18
CVE-2022-48338
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c
- FEDORA-2023-29df561f1d
- FEDORA-2023-29df561f1d
- FEDORA-2023-5763445abe
- FEDORA-2023-5763445abe
- DSA-5360
- DSA-5360
Modified: 2025-03-18
CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=1b4dc4691c1f87fc970fbe568b43869a15ad0d4c
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=1b4dc4691c1f87fc970fbe568b43869a15ad0d4c
- [debian-lts-announce] 20230509 [SECURITY] [DLA 3416-1] emacs security update
- [debian-lts-announce] 20230509 [SECURITY] [DLA 3416-1] emacs security update
- FEDORA-2023-29df561f1d
- FEDORA-2023-29df561f1d
- FEDORA-2023-5763445abe
- FEDORA-2023-5763445abe
- DSA-5360
- DSA-5360
Modified: 2025-03-05
CVE-2023-27985
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467
- [oss-security] 20230309 Re: Shell command and Emacs Lisp code injection in emacsclient-mail.desktop
- [oss-security] 20230309 Re: Shell command and Emacs Lisp code injection in emacsclient-mail.desktop
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.openwall.com/lists/oss-security/2023/03/08/2
- https://www.openwall.com/lists/oss-security/2023/03/08/2
Modified: 2025-03-05
CVE-2023-27986
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc
- [oss-security] 20230309 Re: Shell command and Emacs Lisp code injection in emacsclient-mail.desktop
- [oss-security] 20230309 Re: Shell command and Emacs Lisp code injection in emacsclient-mail.desktop
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.openwall.com/lists/oss-security/2023/03/08/2
- https://www.openwall.com/lists/oss-security/2023/03/08/2