The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.
References
Link | Resource |
---|---|
https://github.com/kovidgoyal/kitty/commit/82c137878c2b99100a3cdc1c0f0efea069313901 | Patch Third Party Advisory |
https://github.com/kovidgoyal/kitty/issues/3128 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2020/dsa-4819 | Third Party Advisory |
https://github.com/kovidgoyal/kitty/commit/82c137878c2b99100a3cdc1c0f0efea069313901 | Patch Third Party Advisory |
https://github.com/kovidgoyal/kitty/issues/3128 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2020/dsa-4819 | Third Party Advisory |
Configurations
History
24 Apr 2025, 17:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kovidgoyal kitty
Kovidgoyal |
|
CPE | cpe:2.3:a:kovidgoyal:kitty:*:*:*:*:*:*:*:* |
Information
Published : 2020-12-21 20:15
Updated : 2025-04-24 17:39
NVD link : CVE-2020-35605
Mitre link : CVE-2020-35605
CVE.ORG link : CVE-2020-35605
JSON object : View
Products Affected
kovidgoyal
- kitty
debian
- debian_linux
CWE