From 35d60f48c1e8e3d48626e53a1933c55805177d20 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Tue, 10 Oct 2023 12:09:13 +0100 Subject: gentoo auto-resync : 10:10:2023 - 12:09:13 --- metadata/glsa/glsa-202310-10.xml | 44 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 metadata/glsa/glsa-202310-10.xml (limited to 'metadata/glsa/glsa-202310-10.xml') diff --git a/metadata/glsa/glsa-202310-10.xml b/metadata/glsa/glsa-202310-10.xml new file mode 100644 index 000000000000..5846410c4634 --- /dev/null +++ b/metadata/glsa/glsa-202310-10.xml @@ -0,0 +1,44 @@ + + + + libcue: Arbitrary Code Execution + A vulnerability has been discovered in libcue which could allow for arbitrary code execution. + libcue + 2023-10-10 + 2023-10-10 + 915500 + remote + + + 2.2.1-r1 + 2.2.1-r1 + + + +

libcue is a CUE Sheet Parser Library.

+
+ +

libcue does not check bounds in a loop and suffers from an integer overflow flaw which can be exploited to take over the program.

+
+ +

Untrusted CUE sheet files can lead to arbitrary code execution. + +app-misc/tracker-miners[cue] uses libcue to index CUE Sheet files in directories. It is possible that downloading a malicious CUE Sheet file into a directory indexed by tracker-miners could lead to remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libcue users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libcue-2.2.1-r1" + +
+ + CVE-2023-43641 + + sam + sam +
\ No newline at end of file -- cgit v1.2.3