Vulnerability CVE-2023-43641: Information

Description

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: Oct. 10, 2023
Modified: Dec. 9, 2023
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
libcue2sisyphus2.3.0-alt12.3.0-alt1ALT-PU-2023-6257-2331437Fixed
libcue2sisyphus_e2k2.3.0-alt12.3.0-alt1ALT-PU-2023-6365-1-Fixed
libcue2sisyphus_riscv642.3.0-alt12.3.0-alt1ALT-PU-2023-6343-1-Fixed
libcue2p102.3.0-alt12.3.0-alt1ALT-PU-2023-6273-3331488Fixed
libcue2p10_e2k2.3.0-alt12.3.0-alt1ALT-PU-2023-7156-1-Fixed
libcue2c10f12.3.0-alt12.3.0-alt1ALT-PU-2023-6613-2332373Fixed
libcue2c9f22.3.0-alt12.3.0-alt1ALT-PU-2023-6257-2331437Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:lipnitsk:libcue:*:*:*:*:*:*:*:*
      End excliding
      2.3.0

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*