CVE-2019-11461

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-11461
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11461.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-11461
Related
Published
2019-04-22T21:29:00Z
Modified
2025-01-08T05:38:55.656001Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.

References

Affected packages

Debian:11 / nautilus

Package

Name
nautilus
Purl
pkg:deb/debian/nautilus?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.30.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / nautilus

Package

Name
nautilus
Purl
pkg:deb/debian/nautilus?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.30.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nautilus

Package

Name
nautilus
Purl
pkg:deb/debian/nautilus?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.30.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/gnome/nautilus

Affected ranges

Type
GIT
Repo
https://github.com/gnome/nautilus
Events

Affected versions

3.*

3.32.0