libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to ~/Downloads, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
{
"cwe_ids": [
"CWE-787"
]
}[
{
"source": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-43641-48ddca8c",
"target": {
"function": "track_set_index",
"file": "cd.c"
},
"signature_type": "Function",
"digest": {
"length": 181.0,
"function_hash": "99695740332437513636388773027228342549"
}
},
{
"source": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-43641-7b9cb289",
"target": {
"file": "cd.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"8756292939909018082272915497763044013",
"259355301010329386047062716262160322823",
"224357065587374711409089558417898133088",
"50921009255475541106831150329911720118"
]
}
}
]