Lucene search

K
debianDebianDEBIAN:DSA-5524-1:65FD4
HistoryOct 11, 2023 - 6:13 p.m.

[SECURITY] [DSA 5524-1] libcue security update

2023-10-1118:13:29
lists.debian.org
12
cd metadata
debian
cve-2023-43641
security update
libcue

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%


Debian Security Advisory DSA-5524-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
October 11, 2023 https://www.debian.org/security/faq


Package : libcue
CVE ID : CVE-2023-43641

Kevin Backhouse discovered an out-of-bounds array access in Libcue, a
library for parsing CD metadata, which could result in the execution of
arbitrary code.

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.2.1-3+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 2.2.1-4+deb12u1.

We recommend that you upgrade your libcue packages.

For the detailed security status of libcue please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libcue

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%