Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 | Patch |
https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 | Exploit Third Party Advisory |
Configurations
History
04 Jan 2024, 17:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:deepin:deepin-compressor:*:*:*:*:*:*:*:* | |
References | () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 - Exploit, Third Party Advisory | |
References | () https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 - Patch |
27 Dec 2023, 18:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-27 17:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-50255
Mitre link : CVE-2023-50255
CVE.ORG link : CVE-2023-50255
JSON object : View
Products Affected
deepin
- deepin-compressor