• [gentoo-announce] [ GLSA 202408-17 ] Nautilus: Denial of Service

    From glsamaker@gentoo.org@21:1/5 to All on Fri Aug 9 11:30:02 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202408-17
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Nautilus: Denial of Service
    Date: August 09, 2024
    Bugs: #881509
    ID: 202408-17

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Nautilus, which can lead to a
    denial of service.

    Background
    ==========

    Default file manager for the GNOME desktop

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------- ------------ ------------
    gnome-base/nautilus < 44.0 >= 44.0

    Description
    ===========

    Please review the CVE identifier referenced below for details.

    Impact
    ======

    GNOME Nautilus allows a NULL pointer dereference and get_basename
    application crash via a pasted ZIP archive.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Nautilus users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=gnome-base/nautilus-44.0"

    References
    ==========

    [ 1 ] CVE-2022-37290
    https://nvd.nist.gov/vuln/detail/CVE-2022-37290

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202408-17

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAma13+QACgkQFMQkOaVy +9malg/+MoW7OtFA9hANLtySw6tugwfvWyzmIgdbpVl3kg7Y5JBsaVXB6YaklblM aw0mLW+kFr7LjQvOVkJ/uHLAJZCF7LsSHczJ8uXBhDFP+NrsrEVU31IxkuXfkPH6 DDQpwxyPVmcuOKplerMMqdBN2VFjqLLsCOVaNgT1y7SM37A68LQFuVbXqUdmH/d9 v06RF9HBM9xcG+i//RcP37wupQ1mGwgTLTBih3BaZ1pMI4KE1CqV+izHpapl2kXs R4SDs0eDasEb2raVfQf4KdQFBWhqOM/SY9U/HgamLllk+zmSwz1STBK+I3oHGTDA gT1qRGlcMXK5xath/HEn+FNw2MsgOT+F3ksRAyHkzWyzVGWcKsoxqRdFZ6TaxLgO /s6jnJfIPB0vbYd+XmBrmYGRwpd1Gy1Ni1EudwMHg2RY5IiXYDpZQVWmdi/FS1OG csn4zdFTJtlPPrtSIN+dJBDXgYVoJLqNdPQiWWYol7r3dvGGgojtHWGnFRquGBjy DfjemzXaS/CAcLu0Bvqk7Q9KNmhcunzIZXlUIgeRSCgXZRs1ibg26J7qUjJYT+8u DdAKTvshLxhMt9McnHRNN+JME5x2sZgRyYjEXpxVxDmlEV4xLhZpNNts9YJc6QAy tcI0WDagHulaBxO8mWi+/XzwWCF7yRMHKVPp56gsLNG6g5ME3OY=
    =+HDL
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)