It was discovered that Budgie Extras incorrectly handled certain temporary file paths. An attacker could possibly use this issue to inject false information or deny access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject arbitrary PNG data in this path and have it displayed on the victim's desktop or deny access to the application. (CVE-2023-49344)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject false information or deny access to the application. (CVE-2023-49345, CVE-2023-49346)
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "budgie-app-launcher-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-applications-menu-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-brightness-controller-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-clockworks-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-countdown-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-dropby-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-extras-common",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-extras-daemon",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-fuzzyclock-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-hotcorners-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-kangaroo-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-keyboard-autoswitch-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-network-manager-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-previews",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-previews-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-quickchar",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-quicknote-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-recentlyused-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-rotation-lock-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-showtime-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-takeabreak-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-trash-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-visualspace-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-wallstreet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-weathershow-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-window-shuffler",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-workspace-stopwatch-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        },
        {
            "binary_name": "budgie-workspace-wallpaper-applet",
            "binary_version": "1.4.0-1ubuntu3.1"
        }
    ]
}
          {
    "cves": [
        {
            "id": "CVE-2023-49342",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-49343",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-49344",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-49345",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-49346",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-49347",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}