Fix etags local command injection vulnerability (CVE-2022-48337)
authorlu4nx <lx@shellcodes.org>
Tue, 6 Dec 2022 07:42:40 +0000 (15:42 +0800)
committerRob Browning <rlb@defaultvalue.org>
Sat, 13 May 2023 20:17:27 +0000 (21:17 +0100)
commit2ac783640004032d6610be442bbc8a98f641dfb4
treeec68ed03b412c38adfe7f7be7171a34dd021902b
parentbe69d7108c0411369888a21bec0bd2abfadd75b0
Fix etags local command injection vulnerability (CVE-2022-48337)

This upstream patch has been incorporated to fix the problem:

  Fix etags local command injection vulnerability

  * lib-src/etags.c: (escape_shell_arg_string): New function.
  (process_file_name): Use it to quote file names passed to the
  shell.  (Bug#59817)

Origin: upstream, commit e339926272a598bd9ee7e02989c1662b89e64cf0
Bug: https://debbugs.gnu.org/59817
Bug-Debian: https://bugs.debian.org/1031730
Forwarded: not-needed

Gbp-Pq: Name 0022-Fix-etags-local-command-injection-vulnerability-CVE-.patch
lib-src/etags.c