Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2022-37290

Published: 14 November 2022

GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.

Priority

Medium

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
nautilus
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
bionic
Released (1:3.26.4-0~ubuntu18.04.6)
focal
Released (1:3.36.3-0ubuntu1.20.04.2)
jammy
Released (1:42.2-0ubuntu2.1)
kinetic
Released (1:43.0-1ubuntu2.1)
upstream Needs triage

xenial Not vulnerable
(code not present)
lunar
Released (1:44~alpha-0ubuntu1)
Patches:
other: https://gitlab.gnome.org/GNOME/nautilus/-/merge_requests/1001
upstream: https://gitlab.gnome.org/GNOME/nautilus/-/commit/cd081619d1597d07ce77fec4474e44dae9132f52
caja
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
trusty Does not exist

bionic Needs triage

focal Needs triage

jammy Needs triage

upstream Needs triage

xenial Needs triage

lunar Needs triage

nemo
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
trusty Ignored
(end of standard support)
bionic Needs triage

focal Needs triage

jammy Needs triage

upstream Needs triage

xenial Needs triage

lunar Needs triage

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H