exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-6556-1

Ubuntu Security Notice USN-6556-1
Posted Dec 15, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6556-1 - It was discovered that Budgie Extras incorrectly handled certain temporary file paths. An attacker could possibly use this issue to inject false information or deny access to the application. Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject arbitrary PNG data in this path and have it displayed on the victim's desktop or deny access to the application.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2023-49342, CVE-2023-49344, CVE-2023-49346
SHA-256 | 1e445a20e0c3e2f5cd796458dc464196f8b71e35096e6c4f1fb6ced4a09715a1

Ubuntu Security Notice USN-6556-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-6556-1
December 14, 2023

budgie-extras vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in budgie-extras.

Software Description:
- budgie-extras: Applet to provide an alternative means to launch applications

Details:

It was discovered that Budgie Extras incorrectly handled certain temporary file paths.
An attacker could possibly use this issue to inject false information or deny
access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject arbitrary PNG
data in this path and have it displayed on the victim's desktop or deny access
to the application. (CVE-2023-49344)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject false information
or deny access to the application. (CVE-2023-49345, CVE-2023-49346)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
budgie-clockworks-applet 1.7.0-3.0ubuntu1
budgie-dropby-applet 1.7.0-3.0ubuntu1
budgie-previews 1.7.0-3.0ubuntu1
budgie-takeabreak-applet 1.7.0-3.0ubuntu1
budgie-weathershow-applet 1.7.0-3.0ubuntu1

Ubuntu 23.04:
budgie-clockworks-applet 1.6.0-1ubuntu0.1
budgie-dropby-applet 1.6.0-1ubuntu0.1
budgie-previews-applet 1.6.0-1ubuntu0.1
budgie-takeabreak-applet 1.6.0-1ubuntu0.1
budgie-weathershow-applet 1.6.0-1ubuntu0.1

Ubuntu 22.04 LTS:
budgie-clockworks-applet 1.4.0-1ubuntu3.1
budgie-dropby-applet 1.4.0-1ubuntu3.1
budgie-previews-applet 1.4.0-1ubuntu3.1
budgie-takeabreak-applet 1.4.0-1ubuntu3.1
budgie-weathershow-applet 1.4.0-1ubuntu3.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6556-1
CVE-2023-49342, CVE-2023-49343, CVE-2023-49344, CVE-2023-49345,
CVE-2023-49346, CVE-2023-49347

Package Information:
https://launchpad.net/ubuntu/+source/budgie-extras/1.7.0-3.0ubuntu1
https://launchpad.net/ubuntu/+source/budgie-extras/1.6.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/budgie-extras/1.4.0-1ubuntu3.1

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close