Temporary data passed between application components by Budgie Extras Window Shuffler applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-rhwf-6fc9-9jvm | third party advisory issue tracking |
https://ubuntu.com/security/notices/USN-6556-1 | third party advisory vendor advisory |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49344 | third party advisory issue tracking |