CVE-2023-43641
Summary
| CVE | CVE-2023-43641 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-09 22:15:00 UTC |
| Updated | 2023-10-27 17:53:00 UTC |
| Description | libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 37 Update: tracker-miners-3.4.5-1.fc37 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| libcue: Arbitrary Code Execution (GLSA 202310-10) — Gentoo security |
MISC |
security.gentoo.org |
|
| [SECURITY] Fedora 39 Update: libcue-2.2.1-13.fc39 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 38 Update: tracker-miners-3.5.3-1.fc38 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| Debian -- Security Information -- DSA-5524-1 libcue |
MISC |
www.debian.org |
|
| [SECURITY] Fedora 38 Update: libcue-2.2.1-13.fc38 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641) - The GitHub Blog |
MISC |
github.blog |
|
| [SECURITY] Fedora 37 Update: libcue-2.2.1-13.fc37 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| [SECURITY] [DLA 3615-1] libcue security update |
MISC |
lists.debian.org |
|
| Out-of-bounds array access in track_set_index · Advisory · lipnitsk/libcue · GitHub |
MISC |
github.com |
|
| Changelog, CMakeLists.txt: Release 2.3.0 · lipnitsk/libcue@cfb98a0 · GitHub |
MISC |
github.com |
|
| Check that the array index isn't negative. This fixes CVE-2023-43641. · lipnitsk/libcue@fdf72c8 · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 199816 Ubuntu Security Notification for CUE Vulnerability (USN-6423-1)
- 199904 Ubuntu Security Notification for CUE Vulnerability (USN-6423-2)
- 284601 Fedora Security Update for tracker (FEDORA-2023-40044895ce)
- 284602 Fedora Security Update for tracker (FEDORA-2023-e8f45c67f5)
- 284609 Fedora Security Update for libcue (FEDORA-2023-eec9ce5935)
- 284613 Fedora Security Update for libcue (FEDORA-2023-1fe05ac8d9)
- 285205 Fedora Security Update for libcue (FEDORA-2023-f4e74a94a2)
- 503376 Alpine Linux Security Update for libcue
- 506107 Alpine Linux Security Update for libcue
- 6000285 Debian Security Update for libcue (DLA 3615-1)
- 6000317 Debian Security Update for libcue (DSA 5524-1)
- 691328 Free Berkeley Software Distribution (FreeBSD) Security Update for libcue (ae0ee356-6ae1-11ee-bfb6-8c164567ca3c)
- 710771 Gentoo Linux libcue Arbitrary Code Execution Vulnerability (GLSA 202310-10)
- 755098 SUSE Enterprise Linux Security Update for libcue (SUSE-SU-2023:4090-1)