Описание
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | 1:28.2+1-12ubuntu1 |
esm-apps/focal | released | 1:26.3+1-1ubuntu2+esm1 |
esm-apps/jammy | released | 1:27.1+1-3ubuntu5.2 |
esm-apps/noble | not-affected | 1:28.2+1-12ubuntu1 |
focal | ignored | end of standard support, was needed |
jammy | released | 1:27.1+1-3ubuntu5.2 |
kinetic | ignored | end of life, was needed |
lunar | not-affected | 1:28.2+1-12ubuntu1 |
mantic | not-affected | 1:28.2+1-12ubuntu1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
kinetic | DNE | |
trusty | ignored | end of standard support |
upstream | needs-triage | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | released | 24.5+1-6ubuntu1.1+esm4 |
focal | DNE | |
jammy | DNE | |
kinetic | DNE | |
trusty | not-affected | code not present |
upstream | needs-triage | |
xenial | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
esm-infra/bionic | released | 25.2+1-6ubuntu0.1~esm2 |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
kinetic | DNE | |
trusty | DNE | |
upstream | needs-triage | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
kinetic | ignored | end of life, was needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
kinetic | ignored | end of life, was needs-triage |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
GNU Emacs through 28.2 allows attackers to execute commands via shell ...
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
EPSS
9.8 Critical
CVSS3