Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-43929

Опубликовано: 20 апр. 2025
Источник: debian
EPSS Низкий

Описание

open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kittyfixed0.41.1-1package
kittynot-affectedbullseyepackage

Примечания

  • https://github.com/kovidgoyal/kitty/commit/ce5cfdd9caf44c538af800a07162e1f49bd53c35 (v0.41.0)

  • PoC: https://github.com/0xBenCantCode/CVE-2025-43929

  • Vulernable code introduced with: https://github.com/kovidgoyal/kitty/commit/1454af2d416f0eb738c2268ee3297cacb0215dd0 (v0.24.2)

EPSS

Процентиль: 1%
0.00011
Низкий

Связанные уязвимости

CVSS3: 4.1
ubuntu
2 месяца назад

open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).

CVSS3: 4.1
nvd
2 месяца назад

open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).

CVSS3: 4.1
github
2 месяца назад

open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).

EPSS

Процентиль: 1%
0.00011
Низкий