CVE-2018-10361

An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
VendorProductVersion
kdektexteditor
5.34.0 ≤
𝑥
≤ 5.45.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ktexteditor
bullseye
5.78.0-3
fixed
stretch
not-affected
bookworm
5.103.0-1.1
fixed
sid
5.115.0-3
fixed
trixie
5.115.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ktexteditor
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
ignored
cosmic
ignored
bionic
needed
artful
ignored
xenial
not-affected
trusty
dne