First published: Mon Apr 22 2019(Updated: )
An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Nautilus | >=3.30<3.30.6 | |
GNOME Nautilus | >=3.32<3.32.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-11461.
The affected software is GNOME Nautilus versions 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1.
This vulnerability has a severity rating of 7.8 (high).
A compromised thumbnailer can escape the bubblewrap sandbox by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal.
Yes, you can find references related to this vulnerability at the following links: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html), [Reference 2](https://gitlab.gnome.org/GNOME/nautilus/issues/987), [Reference 3](https://security.gentoo.org/glsa/201908-27).