Close Menu
Ztoog
    What's Hot
    Science

    Most monstrous marsquake ever reveals where it came from

    Technology

    Telesat books 14 launches with SpaceX, bypassing Blue Origin and Relativity

    Technology

    Can Flow Batteries Finally Beat Lithium?

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » CD-indexing cue files are the core of a serious Linux remote code exploit
    Gadgets

    CD-indexing cue files are the core of a serious Linux remote code exploit

    Facebook Twitter Pinterest WhatsApp
    CD-indexing cue files are the core of a serious Linux remote code exploit
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Enlarge / Cue files was a lot better-known, again once we all used CD-Rs to make authorized backup copies of materials that we owned outright.

    Getty Images

    It has been a very very long time since the common laptop consumer considered .cue files, or cue sheets, the metadata bits that describe the tracks of an optical disc, like a CD or DVD. But cue sheets are getting consideration once more, for all the mistaken causes. They’re at the coronary heart of a one-click exploit that might give an attacker code execution on Linux methods with GNOME desktops.

    CVE-2023-43641, disclosed by GitHub on October 9, is a reminiscence corruption (or out-of-bounds array writing) subject in the libcue library, which parses cue sheets. NIST has but to supply a rating for the subject, however GitHub’s submission charges it an 8.8, or “High.” While the vulnerability has been patched in the core library, Linux distributions might want to replace their desktops to repair it.

    GNOME desktops have, by default, a “tracker miner” that robotically updates at any time when sure file areas in a consumer’s dwelling listing are modified. If a consumer was compelled to obtain a cue sheet that took benefit of libcue’s vulnerability, GNOME’s indexing tracker would learn the cue sheet, and code in that sheet might be executed.

    • Part one of the .cue-based exploit instance: An Ubuntu desktop, with a browser open, downloading a CUE file.


      Kevin Backhouse / GitHub

    • Part 2: A calculator instantly pops up, with “1337” in the numerical show. You can think about that almost all exploits would have far worse penalties.


      Kevin Backhouse / GitHub

    Kevin Backhouse, a member of GitHub’s Security Lab, gives a video demonstration of the exploit in his weblog submit however has not but revealed the proof of idea to permit for patching. You can take a look at your system’s vulnerability in opposition to a take a look at cue sheet he gives, which ought to set off “a benign crash.”

    Advertisement

    The bug is restricted to how libcue reads the index of a disc observe or its quantity and size. Because of the system instruments it makes use of, you may trick libcue into registering a damaging quantity for an index. Then, as a result of one other half of the scanning routine does not test whether or not an index quantity is damaging earlier than it writes it to an array, an attacker can write exterior the array’s bounds. Backhouse’s proposed repair provides a single situation test to the index-setting routine.

    Backhouse’s weblog submit explains additional how tracker-miners, like these in GNOME, are notably weak to this type of exploit.

    The present resolution is for customers of GNOME-based distributions to replace their methods as quickly as potential. The vulnerability in libcue is patched as of model 2.3.0. Libcue is usually a quite quiet mission, maintained largely by Ilya Lipnitskiy alone. It illustrates, but once more, the huge quantities of technological infrastructure underpinned by tiny, unpaid initiatives.

    This is not Backhouse’s first contribution to broad Linux vulnerabilities. He has beforehand discovered points with commonplace customers changing into root with a few instructions and a Polkit exploit that additionally supplied root entry. Backhouse, regardless of being a recurring bearer of dangerous information, added this footnote to his most up-to-date vulnerability disclosure: “I presently run Ubuntu 23.04 as my most important OS and I love the GNOME desktop setting.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Gadgets

    Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

    Gadgets

    Apple plans to split iPhone 18 launch into two phases in 2026

    Gadgets

    Upgrade your desk to Starfleet status with this $95 USB-C hub

    Gadgets

    37 Best Graduation Gift Ideas (2025): For College Grads

    Gadgets

    Backblaze responds to claims of “sham accounting,” customer backups at risk

    Gadgets

    Snapdragon X Plus Could Bring Faster, More Powerful Chromebooks

    Gadgets

    This AI Tool Can Detect Scams in Photos, Videos and WhatsApp

    Gadgets

    Digital frame maker Aura introduces the Aspen, a $229 frame with more intelligent features

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Science

    Montana Youth Win a Historic Climate Case

    “I know that climate change is a global issue, but Montana needs to take responsibility…

    AI

    Using deep learning to image the Earth’s planetary boundary layer | Ztoog

    Although the troposphere is commonly considered the closest layer of the environment to the Earth’s…

    The Future

    Inspired Capital secures $330M fund to take venture capital ‘back to the studs’

    Inspired Capital is celebrating its fifth birthday with the closing of its Inspired Capital Fund…

    Gadgets

    3 Ways To Resize Same Profile Picture for Any Social Media App

    Do you have got an ideal image that can be utilized as a profile image…

    Science

    Extreme Heat Threatens the Health of Unborn Babies | WIRED

    And scorching climate could have an effect on a child’s growth in different methods: A…

    Our Picks
    AI

    This AI Research Unveils Photo-SLAM: Elevating Real-Time Photorealistic Mapping on Portable Devices

    The Future

    The Role of Technology in Shaping the Financial Industry

    The Future

    Salesforce embeds conversational AI across the platform with Einstein Copilot

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    Crypto

    ETH Remains Steady At Over $2,300

    The Future

    How To Make Your Website More Interactive

    Science

    This “smoking gun” killed the McDonald’s ice cream hackers’ startup

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.