Fix etags local command injection vulnerability (CVE-2022-48337)
This upstream patch has been incorporated to fix the problem:
Fix etags local command injection vulnerability
* lib-src/etags.c: (escape_shell_arg_string): New function.
(process_file_name): Use it to quote file names passed to the
shell. (Bug#59817)
Origin: upstream, commit
e339926272a598bd9ee7e02989c1662b89e64cf0
Bug: https://debbugs.gnu.org/59817
Bug-Debian: https://bugs.debian.org/
1031730
Forwarded: not-needed
Gbp-Pq: Name 0022-Fix-etags-local-command-injection-vulnerability-CVE-.patch