Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 833152 - <kde-apps/kate-21.12.1: untrusted binary execution
Summary: <kde-apps/kate-21.12.1: untrusted binary execution
Status: RESOLVED DUPLICATE of bug 832447
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://kde.org/info/security/advisor...
Whiteboard: B2 [stable?]
Keywords:
Depends on:
Blocks: 833154
  Show dependency tree
 
Reported: 2022-02-12 03:45 UTC by John Helmert III
Modified: 2022-02-16 18:40 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-12 03:45:08 UTC
Alias:
CVE-2022-23853:

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-02-12 03:56:40 UTC
I thought I'd filed bugs for this but note that (thanks to asturm for pointing it out) it's one or t'other -- the frameworks fix covers Kate too.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-16 18:40:55 UTC

*** This bug has been marked as a duplicate of bug 832447 ***