libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-10-09T21:01:04.603Z

Updated: 2024-06-04T17:25:56.402Z

Reserved: 2023-09-20T15:35:38.146Z


Link: CVE-2023-43641

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-10-09T22:15:12.707

Modified: 2023-12-09T19:15:07.813


Link: CVE-2023-43641

JSON object: View

cve-icon Redhat Information

No data.

CWE