First published: Fri Sep 23 2022(Updated: )
In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kitty | <0.26.2 | |
Red Hat Fedora | =36 | |
Red Hat Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41322 has a critical severity level due to its potential for arbitrary code execution.
To fix CVE-2022-41322, upgrade Kitty to version 0.26.2 or later.
CVE-2022-41322 requires user interaction to exploit, making it a client-side vulnerability.
CVE-2022-41322 affects all versions of Kitty prior to 0.26.2.
Yes, CVE-2022-41322 affects Fedora 36 and 37 when using vulnerable versions of Kitty.