CVE Vulnerabilities

CVE-2023-49343

Predictable Seed in Pseudo-Random Number Generator (PRNG)

Published: Dec 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

Weakness

A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.

Affected Software

NameVendorStart VersionEnd Version
Budgie_extrasUbuntubudgie1.4.0 (including)1.7.1 (excluding)
Budgie-extrasUbuntubionic*
Budgie-extrasUbuntuesm-apps/jammy*
Budgie-extrasUbuntufocal*
Budgie-extrasUbuntujammy*
Budgie-extrasUbuntulunar*
Budgie-extrasUbuntumantic*
Budgie-extrasUbuntuoracular*
Budgie-extrasUbuntuplucky*
Budgie-extrasUbuntutrusty*
Budgie-extrasUbuntuxenial*

Potential Mitigations

References