Описание
Security update for emacs
This update for emacs fixes the following issues:
- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15 SP4
emacs-27.2-150400.3.3.1
emacs-el-27.2-150400.3.3.1
emacs-info-27.2-150400.3.3.1
emacs-nox-27.2-150400.3.3.1
etags-27.2-150400.3.3.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP4
emacs-x11-27.2-150400.3.3.1
openSUSE Leap 15.4
emacs-27.2-150400.3.3.1
emacs-el-27.2-150400.3.3.1
emacs-info-27.2-150400.3.3.1
emacs-nox-27.2-150400.3.3.1
emacs-x11-27.2-150400.3.3.1
etags-27.2-150400.3.3.1
Ссылки
- Link for SUSE-SU-2022:4304-1
- E-Mail link for SUSE-SU-2022:4304-1
- SUSE Security Ratings
- SUSE Bug 1205822
- SUSE CVE CVE-2022-45939 page
Описание
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-27.2-150400.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-el-27.2-150400.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-info-27.2-150400.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:emacs-nox-27.2-150400.3.3.1
Ссылки
- CVE-2022-45939
- SUSE Bug 1205822
- SUSE Bug 1208026
- SUSE Bug 1208348