It was discovered that Budgie Extras incorrectly handled certain temporary file paths. An attacker could possibly use this issue to inject false information or deny access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject arbitrary PNG data in this path and have it displayed on the victim's desktop or deny access to the application. (CVE-2023-49344)
Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject false information or deny access to the application. (CVE-2023-49345, CVE-2023-49346)
{
"binaries": [
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-app-launcher-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-applications-menu-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-brightness-controller-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-clockworks-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-countdown-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-dropby-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-extras-common"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-extras-daemon"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-fuzzyclock-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-hotcorners-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-kangaroo-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-keyboard-autoswitch-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-network-manager-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-previews"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-previews-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-quickchar"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-quicknote-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-recentlyused-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-rotation-lock-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-showtime-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-takeabreak-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-trash-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-visualspace-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-wallstreet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-weathershow-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-window-shuffler"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-workspace-stopwatch-applet"
},
{
"binary_version": "1.4.0-1ubuntu3.1",
"binary_name": "budgie-workspace-wallpaper-applet"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49342"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49343"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49344"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49345"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49346"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2023-49347"
}
],
"ecosystem": "Ubuntu:22.04:LTS"
}