CVE-2022-24986

KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/02/25/3 Mailing List Third Party Advisory
https://apps.kde.org/kcron/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:kde:kcron:*:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-862 CWE-668
CWE-362

08 Mar 2022, 18:19

Type Values Removed Values Added
First Time Kde
Kde kcron
CWE CWE-862
CPE cpe:2.3:a:kde:kcron:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
References (MISC) http://www.openwall.com/lists/oss-security/2022/02/25/3 - (MISC) http://www.openwall.com/lists/oss-security/2022/02/25/3 - Mailing List, Third Party Advisory
References (MISC) https://apps.kde.org/kcron/ - (MISC) https://apps.kde.org/kcron/ - Product

26 Feb 2022, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-26 05:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-24986

Mitre link : CVE-2022-24986

CVE.ORG link : CVE-2022-24986


JSON object : View

Products Affected

kde

  • kcron
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-668

Exposure of Resource to Wrong Sphere