Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-25255

Опубликовано: 16 фев. 2022
Источник: redhat
CVSS3: 7.8

Описание

In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH.

A flaw was found in qt. The vulnerability occurs due to executing binaries from the current directory when the loading path failed, leading to an uncontrolled path element vulnerability. This flaw allows an attacker to execute malicious executables.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qtNot affected
Red Hat Enterprise Linux 6qt3Not affected
Red Hat Enterprise Linux 7qtNot affected
Red Hat Enterprise Linux 7qt3Not affected
Red Hat Enterprise Linux 8qt5FixedRHSA-2022:748208.11.2022
Red Hat Enterprise Linux 9qt5FixedRHSA-2022:802215.11.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-427
https://bugzilla.redhat.com/show_bug.cgi?id=2055505qt: QProcess could execute a binary from the current working directory when not found in the PATH

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH.

CVSS3: 7.8
nvd
больше 3 лет назад

In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH.

CVSS3: 7.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
больше 3 лет назад

In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux ...

rocky
больше 2 лет назад

Moderate: qt5 security and bug fix update

7.8 High

CVSS3