Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
{ "binaries": [ { "binary_version": "1.2.17-1", "binary_name": "telegram-desktop" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-17448.json"
{ "binaries": [ { "binary_version": "3.1.1+ds-1~ubuntu20.04.1", "binary_name": "telegram-desktop" } ] }