Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.
The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.
Link | Tags |
---|---|
https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-27g2-7x65-3cc5 | third party advisory issue tracking |
https://ubuntu.com/security/notices/USN-6556-1 | third party advisory vendor advisory |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49343 | third party advisory issue tracking |