libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to ~/Downloads
, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
[ { "signature_type": "Function", "id": "CVE-2023-43641-48ddca8c", "source": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e", "signature_version": "v1", "target": { "function": "track_set_index", "file": "cd.c" }, "digest": { "function_hash": "99695740332437513636388773027228342549", "length": 181.0 }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2023-43641-7b9cb289", "source": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e", "signature_version": "v1", "target": { "file": "cd.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "8756292939909018082272915497763044013", "259355301010329386047062716262160322823", "224357065587374711409089558417898133088", "50921009255475541106831150329911720118" ] }, "deprecated": false } ]