KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/02/25/3 | Mailing List Third Party Advisory |
https://apps.kde.org/kcron/ | Product |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 CWE-668 |
Information
Published : 2022-02-26 05:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-24986
Mitre link : CVE-2022-24986
CVE.ORG link : CVE-2022-24986
JSON object : View
Products Affected
kde
- kcron