Lucene search

K
gentooGentoo FoundationGLSA-202408-17
HistoryAug 09, 2024 - 12:00 a.m.

Nautilus: Denial of Service

2024-08-0900:00:00
Gentoo Foundation
security.gentoo.org
3
gnome nautilus
denial of service
zip archive
vulnerability

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

Background

Default file manager for the GNOME desktop

Description

Please review the CVE identifier referenced below for details.

Impact

GNOME Nautilus allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.

Workaround

There is no known workaround at this time.

Resolution

All Nautilus users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=gnome-base/nautilus-44.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyallgnome-base/nautilus< 44.0UNKNOWN

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low