First published: Mon Oct 09 2023(Updated: )
libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/libcue | <2.2.1-2ubuntu0.1 | 2.2.1-2ubuntu0.1 |
ubuntu/libcue | <2.2.1-3ubuntu0.1 | 2.2.1-3ubuntu0.1 |
ubuntu/libcue | <2.2.1-4ubuntu0.1 | 2.2.1-4ubuntu0.1 |
ubuntu/libcue | <2.2.1-4ubuntu1 | 2.2.1-4ubuntu1 |
Lipnitsk Libcue | <2.3.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
debian/libcue | <=2.2.1-2<=2.2.1-3 | 2.2.1-2+deb10u1 2.2.1-3+deb11u1 2.2.1-4+deb12u1 2.2.1-4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43641 is a vulnerability in libcue 2.2.1 and prior that allows for out-of-bounds array access.
Users of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage.
The severity of CVE-2023-43641 is rated as high with a CVSS score of 8.8.
Versions 2.2.1 and prior of libcue are affected by CVE-2023-43641.
To fix CVE-2023-43641, users should update to version 2.2.1-2ubuntu0.1 or later of libcue.