It was discovered that Budgie Extras incorrectly handled certain temporary file paths. An attacker could possibly use this issue to inject false information or deny access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject arbitrary PNG data in this path and have it displayed on the victim's desktop or deny access to the application. (CVE-2023-49344)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject false information or deny access to the application. (CVE-2023-49345, CVE-2023-49346)
{
"binaries": [
{
"binary_name": "budgie-app-launcher-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-applications-menu-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-brightness-controller-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-clockworks-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-countdown-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-dropby-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-extras-common",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-extras-daemon",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-fuzzyclock-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-hotcorners-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-kangaroo-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-keyboard-autoswitch-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-network-manager-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-previews",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-previews-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-quickchar",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-quicknote-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-recentlyused-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-rotation-lock-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-showtime-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-takeabreak-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-trash-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-visualspace-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-wallstreet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-weathershow-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-window-shuffler",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-workspace-stopwatch-applet",
"binary_version": "1.4.0-1ubuntu3.1"
},
{
"binary_name": "budgie-workspace-wallpaper-applet",
"binary_version": "1.4.0-1ubuntu3.1"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49342"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49343"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49344"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49345"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49346"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49347"
}
]
}