{"id":"CVE-2023-5557","details":"A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.","modified":"2026-03-15T22:47:55.261729Z","published":"2023-10-13T02:15:11.077Z","related":["ALSA-2023:7712","ALSA-2023:7732","SUSE-SU-2023:4868-1","openSUSE-SU-2024:13573-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7712"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7713"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7730"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7731"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7732"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7733"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7739"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7744"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-5557"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243096"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-5557.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.3.2"}]},{"events":[{"introduced":"3.4.0"},{"fixed":"3.4.5"}]},{"events":[{"introduced":"3.5.0"},{"fixed":"3.5.3"}]},{"events":[{"introduced":"3.6.0"},{"fixed":"3.6.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}