2 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory. El plugin LSP (Language Server Protocol) en KDE Kate versiones anteriores a 21.12.2 y KTextEditor versiones anteriores a 5.91.0 intenta ejecutar el binario del servidor LSP asociado cuando es abierto un archivo de un tipo determinado. Si este binario está ausente del PATH, intentará ejecutar el binario del servidor LSP en el directorio del archivo que acaba de abrir (debido a un malentendido de la API de QProcess, que nunca fue pretendido). • https://apps.kde.org/kate https://kde.org/info/security/advisory-20220131-1.txt https://security.gentoo.org/glsa/202401-21 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation. Se ha descubierto un problema en KTextEditor, desde la versión 5.34.0 hasta la 5.45.0. • http://www.openwall.com/lists/oss-security/2018/04/24/1 http://www.openwall.com/lists/oss-security/2019/07/09/3 https://bugzilla.suse.com/show_bug.cgi?id=1033055 • CWE-668: Exposure of Resource to Wrong Sphere •