Temporary data passed between application components by Budgie Extras Windows Previews could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may read private information from windows, present false information to users, or deny access to the application.
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://ubuntu.com/security/notices/USN-6556-1 | third party advisory vendor advisory |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49347 | third party advisory issue tracking |
https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-xxfq-fqfp-cpvj | third party advisory issue tracking |