libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-10-09T21:01:04.603Z

Updated: 2024-08-02T19:44:43.840Z

Reserved: 2023-09-20T15:35:38.146Z

Link: CVE-2023-43641

cve-icon Vulnrichment

Updated: 2024-08-02T19:44:43.840Z

cve-icon NVD

Status : Modified

Published: 2023-10-09T22:15:12.707

Modified: 2023-12-09T19:15:07.813

Link: CVE-2023-43641

cve-icon Redhat

Severity : Important

Publid Date: 2023-10-09T00:00:00Z

Links: CVE-2023-43641 - Bugzilla