<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nautilus</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2210-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-06T08:27:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-06T08:27:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-06T08:27:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nautilus</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nautilus fixes the following issues:

Security issue fixed:

- CVE-2017-14604: Add a metadata::trusted metadata to the file once the user
  acknowledges the file as trusted, and also remove the 'trusted' content in the
  desktop file (bsc#1060031).

This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00011.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2210-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnome-shell-search-provider-nautilus-3.20.3-8.3.1">
      <FullProductName ProductID="gnome-shell-search-provider-nautilus-3.20.3-8.3.1">gnome-shell-search-provider-nautilus-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnautilus-extension1-3.20.3-8.3.1">
      <FullProductName ProductID="libnautilus-extension1-3.20.3-8.3.1">libnautilus-extension1-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnautilus-extension1-32bit-3.20.3-8.3.1">
      <FullProductName ProductID="libnautilus-extension1-32bit-3.20.3-8.3.1">libnautilus-extension1-32bit-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nautilus-3.20.3-8.3.1">
      <FullProductName ProductID="nautilus-3.20.3-8.3.1">nautilus-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nautilus-devel-3.20.3-8.3.1">
      <FullProductName ProductID="nautilus-devel-3.20.3-8.3.1">nautilus-devel-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nautilus-lang-3.20.3-8.3.1">
      <FullProductName ProductID="nautilus-lang-3.20.3-8.3.1">nautilus-lang-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Nautilus-3_0-3.20.3-8.3.1">
      <FullProductName ProductID="typelib-1_0-Nautilus-3_0-3.20.3-8.3.1">typelib-1_0-Nautilus-3_0-3.20.3-8.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gnome-shell-search-provider-nautilus-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:gnome-shell-search-provider-nautilus-3.20.3-8.3.1">gnome-shell-search-provider-nautilus-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnautilus-extension1-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libnautilus-extension1-3.20.3-8.3.1">libnautilus-extension1-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnautilus-extension1-32bit-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libnautilus-extension1-32bit-3.20.3-8.3.1">libnautilus-extension1-32bit-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nautilus-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:nautilus-3.20.3-8.3.1">nautilus-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nautilus-devel-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:nautilus-devel-3.20.3-8.3.1">nautilus-devel-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nautilus-lang-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:nautilus-lang-3.20.3-8.3.1">nautilus-lang-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Nautilus-3_0-3.20.3-8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:typelib-1_0-Nautilus-3_0-3.20.3-8.3.1">typelib-1_0-Nautilus-3_0-3.20.3-8.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.</Note>
    </Notes>
    <CVE>CVE-2017-14604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:gnome-shell-search-provider-nautilus-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libnautilus-extension1-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libnautilus-extension1-32bit-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:nautilus-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:nautilus-devel-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:nautilus-lang-3.20.3-8.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:typelib-1_0-Nautilus-3_0-3.20.3-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14604.html</URL>
        <Description>CVE-2017-14604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060031</URL>
        <Description>SUSE Bug 1060031</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
