First published: Tue Apr 23 2019(Updated: )
A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical snapd | <2.37.4 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/snapd | 2.49-1+deb11u2 2.57.6-1 2.65.3-1 2.66.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7303 is a vulnerability in the seccomp filters of Canonical snapd before version 2.37.4.
CVE-2019-7303 has a severity rating of 7.5 (high).
Canonical snapd before version 2.37.4, and Canonical Ubuntu Linux versions 14.04, 16.04, 18.04, and 18.10 are affected by CVE-2019-7303.
To fix CVE-2019-7303, update to Canonical snapd version 2.37.4 or higher.
You can find more information about CVE-2019-7303 on the Ubuntu Security Notice page (https://usn.ubuntu.com/3917-1/).