CVE-2019-11460

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-11460
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11460.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-11460
Related
Published
2019-04-22T22:29:00Z
Modified
2025-01-08T05:38:11.437079Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in GNOME gnome-desktop 3.26, 3.28, and 3.30 prior to 3.30.2.2, and 3.32 prior to 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.

References

Affected packages

Debian:11 / gnome-desktop3

Package

Name
gnome-desktop3
Purl
pkg:deb/debian/gnome-desktop3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.30.2.1-2

Ecosystem specific

{
    "urgency": "low"
}

Git / github.com/gnome/gnome-desktop

Affected ranges

Type
GIT
Repo
https://github.com/gnome/gnome-desktop
Events

Affected versions

3.*

3.30.0
3.30.1
3.30.2
3.30.2.1