First published: Wed Dec 27 2023(Updated: )
Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Deepin Deepin-compressor | <5.12.21 |
https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50255 is rated as a critical vulnerability due to its potential for remote command execution.
To mitigate CVE-2023-50255, users should update deepin-compressor to version 5.12.21 or later.
CVE-2023-50255 affects versions of deepin-compressor prior to 5.12.21 on Deepin Linux OS.
CVE-2023-50255 is a path traversal vulnerability that can lead to remote command execution.
Attackers can exploit CVE-2023-50255 to execute arbitrary commands on the target system by opening specially crafted archives.