Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-48338

Опубликовано: 20 фев. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.3

Описание

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

1:28.2+1-12ubuntu1
esm-apps/focal

not-affected

code not present
esm-apps/jammy

released

1:27.1+1-3ubuntu5.2
esm-apps/noble

not-affected

1:28.2+1-12ubuntu1
focal

not-affected

code not present
jammy

released

1:27.1+1-3ubuntu5.2
kinetic

ignored

end of life, was needed
lunar

not-affected

1:28.2+1-12ubuntu1
mantic

not-affected

1:28.2+1-12ubuntu1

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

jammy

DNE

kinetic

DNE

trusty

not-affected

code not present
upstream

needs-triage

xenial

not-affected

code not present

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 32%
0.00119
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

CVSS3: 7.3
nvd
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

CVSS3: 7.3
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.3
debian
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, th ...

CVSS3: 9.8
github
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

EPSS

Процентиль: 32%
0.00119
Низкий

7.3 High

CVSS3

Уязвимость CVE-2022-48338