libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-09T21:01:04.603Z
Updated: 2024-08-02T19:44:43.840Z
Reserved: 2023-09-20T15:35:38.146Z
Link: CVE-2023-43641
Vulnrichment
Updated: 2024-08-02T19:44:43.840Z
NVD
Status : Modified
Published: 2023-10-09T22:15:12.707
Modified: 2024-11-21T08:24:31.480
Link: CVE-2023-43641
Redhat