PRNG Seed Error Affecting budgie-extras package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about PRNG Seed Error vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-BUDGIEEXTRAS-6126130
  • published15 Dec 2023
  • disclosed14 Dec 2023

Introduced: 14 Dec 2023

CVE-2023-49343  (opens in a new tab)
CWE-335  (opens in a new tab)
CWE-668  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 budgie-extras.

NVD Description

Note: Versions mentioned in the description apply only to the upstream budgie-extras package and not the budgie-extras package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.

CVSS Base Scores

version 3.1