CVE-2023-43641

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
GitHub_MCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
lipnitsklibcue
𝑥
< 2.3.0
debiandebian_linux
10.0
debiandebian_linux
11.0
debiandebian_linux
12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcue
bullseye (security)
2.2.1-3+deb11u1
fixed
bullseye
2.2.1-3+deb11u1
fixed
bookworm
2.2.1-4+deb12u1
fixed
bookworm (security)
2.2.1-4+deb12u1
fixed
sid
2.2.1-4.1
fixed
trixie
2.2.1-4.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcue
oracular
Fixed 2.2.1-4ubuntu1
released
noble
Fixed 2.2.1-4ubuntu1
released
mantic
Fixed 2.2.1-4ubuntu1
released
lunar
Fixed 2.2.1-4ubuntu0.1
released
jammy
Fixed 2.2.1-3ubuntu0.1
released
focal
Fixed 2.2.1-2ubuntu0.1
released
bionic
needs-triage
xenial
needs-triage
trusty
ignored
References