exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5314-1

Debian Security Advisory 5314-1
Posted Jan 12, 2023
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5314-1 - It was discovered that missing input sanitising in the ctags functionality of Emacs may result in the execution of arbitrary shell commands.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2022-45939
SHA-256 | 8d71031be094dc1bac13e1c7994d1cfcdb0da1ae5dd428700ba4439417aa0081

Debian Security Advisory 5314-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5314-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 11, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : emacs
CVE ID : CVE-2022-45939
Debian Bug : 1025009

It was discovered that missing input sanitising in the ctags functionality
of Emacs may result in the execution of arbitrary shell commands.

For the stable distribution (bullseye), this problem has been fixed in
version 1:27.1+1-3.1+deb11u1.

We recommend that you upgrade your emacs packages.

For the detailed security status of emacs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/emacs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=gd6B
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close