7.8
CVSSv3

CVE-2022-41322

Published: 23/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

In Kitty prior to 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kitty project kitty

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Debian Bug report logs - #1020582 kitty: CVE-2022-41322 Package: src:kitty; Maintainer for src:kitty is James McCoy <jamessan@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 23 Sep 2022 18:42:01 UTC Severity: important Tags: security, upstream Found in version kitty/0212-1 Reply ...
kitty could be made to run programs if it opened a specially crafted image or desktop notification ...