|
|
Subscribe / Log in / New account

Mageia alert MGASA-2023-0300 (libcue)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2023-0300: Updated libcue packages fix a security vulnerability
Date:  Tue, 24 Oct 2023 00:07:20 +0200
Message-ID:  <20231023220720.341FC9FF6E@duvel.mageia.org>
Archive-link:  Article

MGASA-2023-0300 - Updated libcue packages fix a security vulnerability Publication date: 23 Oct 2023 URL: https://advisories.mageia.org/MGASA-2023-0300.html Type: security Affected Mageia releases: 8, 9 CVE: CVE-2023-43641 Description: Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. (CVE-2023-43641) References: - https://bugs.mageia.org/show_bug.cgi?id=32372 - https://www.openwall.com/lists/oss-security/2023/10/09/3 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4... SRPMS: - 9/core/libcue-2.3.0-1.mga9 - 8/core/libcue-2.3.0-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds