Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 833153 - kde-frameworks/ktexteditor: untrusted binary execution
Summary: kde-frameworks/ktexteditor: untrusted binary execution
Status: RESOLVED DUPLICATE of bug 832447
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://kde.org/info/security/advisor...
Whiteboard: B2 [ebuild]
Keywords:
Depends on:
Blocks: 833154
  Show dependency tree
 
Reported: 2022-02-12 03:46 UTC by John Helmert III
Modified: 2022-02-16 18:41 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-12 03:46:42 UTC
Alias:
CVE-2022-23853:

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-16 18:41:04 UTC

*** This bug has been marked as a duplicate of bug 832447 ***