Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-23853

Опубликовано: 11 фев. 2022
Источник: debian
EPSS Низкий

Описание

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
katefixed4:21.12.2-1package
kateno-dsabullseyepackage
kateno-dsabusterpackage
kateno-dsastretchpackage
ktexteditorfixed5.93.0-1package
ktexteditorno-dsabullseyepackage
ktexteditorno-dsabusterpackage
ktexteditorno-dsastretchpackage

Примечания

  • https://kde.org/info/security/advisory-20220131-1.txt

  • KTextEditor: Fixed by: https://commits.kde.org/ktexteditor/804e49444c093fe58ec0df2ab436565e50dc147e

  • KTextEditor: Fixed by: https://commits.kde.org/ktexteditor/c80f935c345de2e2fb10635202800839ca9697bf

  • Kate: prerequisites:

  • https://commits.kde.org/kate/361dd43e42994829dbdb35e78fb7698d27cbb0e2

  • https://commits.kde.org/kate/6fc3bf6e5bd540e842e32c4a959c2158c8573be5

  • https://commits.kde.org/kate/92a9c65e30b4b63b8b116eb5c8dcb1e1a2d867bc

  • Fixed by: https://commits.kde.org/kate/c5d66f3b70ae4778d6162564309aee95f643e7c9

  • Fixed by: https://commits.kde.org/kate/7e08a58fb50d28ba96aedd5f5cd79a9479b4a0ad

EPSS

Процентиль: 43%
0.00211
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

CVSS3: 7.8
nvd
почти 4 года назад

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

CVSS3: 7.8
github
почти 4 года назад

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

CVSS3: 8.8
fstec
почти 4 года назад

Уязвимость плагина Language Server Protocol текстового редактора Kate, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

suse-cvrf
почти 4 года назад

Security update for libqt5-qtbase

EPSS

Процентиль: 43%
0.00211
Низкий