First published: Wed Feb 09 2022(Updated: )
The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
Credit: security@zoom.us security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Keybase Keybase | <5.9.0 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22779 is a vulnerability that affects Keybase Clients for macOS and Windows before version 5.9.0.
CVE-2022-22779 allows exploded messages initiated by a user to persist if the receiving user switches to a non-chat feature and puts the host in a sleep state before the messages are exploded.
The severity of CVE-2022-22779 is medium with a severity value of 3.7.
Keybase Clients for macOS and Windows versions before 5.9.0 are affected by CVE-2022-22779.
To fix CVE-2022-22779, users should update Keybase Clients to version 5.9.0 or later.