{"id":"MGASA-2023-0081","summary":"Updated emacs packages fix security vulnerability","details":"GNU Emacs through 28.2 allows attackers to execute commands via shell\nmetacharacters in the name of a source-code file, because lib-src/etags.c\nuses the system C library function in its implementation of the etags\nprogram. For example, a victim may use the \"etags -u *\" command (suggested\nin the etags documentation) in a situation where the current working\ndirectory has contents that depend on untrusted input. (CVE-2022-48337)\n\nAn issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the\nruby-find-library-file function has a local command injection\nvulnerability. The ruby-find-library-file function is an interactive\nfunction, and bound to C-c C-f. Inside the function, the external command\ngem is called through shell-command-to-string, but the feature-name\nparameters are not escaped. Thus, malicious Ruby source files may cause\ncommands to be executed. (CVE-2022-48338)\n\nAn issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a\ncommand injection vulnerability. In the hfy-istext-command function, the\nparameter file and parameter srcdir come from external input, and\nparameters are not escaped. If a file name or directory name contains\nshell metacharacters, code may be executed. (CVE-2022-48339)\n","modified":"2026-04-16T00:09:42.809436159Z","published":"2023-03-01T21:14:31Z","upstream":["CVE-2022-48337","CVE-2022-48338","CVE-2022-48339"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0081.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31593"},{"type":"WEB","url":"https://www.debian.org/security/2023/dsa-5360"}],"affected":[{"package":{"name":"emacs","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/emacs?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"27.1-1.3.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0081.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}