Lucene search

K
gentooGentoo FoundationGLSA-201908-27
HistoryAug 31, 2019 - 12:00 a.m.

Nautilus: Security bypass

2019-08-3100:00:00
Gentoo Foundation
security.gentoo.org
278
nautilus
security bypass
gnome
vulnerability
sandbox
local attacker
upgrade
emerge
resolution

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

Background

Default file manager for the GNOME desktop

Description

A vulnerability was discovered in Nautilus which allows an attacker to escape the sandbox.

Impact

A local attacker could possibly bypass sandbox protection.

Workaround

There is no known workaround at this time.

Resolution

All Nautilus users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=gnome-base/nautilus-3.30.5-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallgnome-base/nautilus< 3.30.5-r1UNKNOWN

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

12.6%