Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24986

Опубликовано: 26 фев. 2022
Источник: debian
EPSS Низкий

Описание

KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kcronfixed4:21.12.3-1package
kcronno-dsabullseyepackage
kcronno-dsabusterpackage
kcronignoredstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/02/25/3

  • https://invent.kde.org/system/kcron/-/commit/ef4266e3d5ea741c4d4f442a2cb12a317d7502a1

  • https://invent.kde.org/system/kcron/-/merge_requests/14 (followup fix)

  • https://kde.org/info/security/advisory-20220216-1.txt

EPSS

Процентиль: 26%
0.00088
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.

CVSS3: 7.8
nvd
почти 4 года назад

KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.

CVSS3: 7.8
github
почти 4 года назад

KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.

EPSS

Процентиль: 26%
0.00088
Низкий