First published: Fri Sep 01 2023(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical snapd | <2.59.5 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =22.04 | |
Canonical Ubuntu Linux | =22.10 | |
Canonical Ubuntu Linux | =23.04 | |
debian/snapd | <=2.49-1+deb11u2<=2.57.6-1 | 2.65.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1523 is critical with a severity value of 10.
The affected software is snapd, specifically versions 2.58+18.04.1, 2.58+20.04.1, 2.58+22.04.1, 2.58+22.10.1, 2.59.1+23.04ubuntu1.1, 2.59.5-1, and 2.54.3+16.04.0ubuntu0.1~.
By using the TIOCLINUX ioctl request, a malicious snap can inject arbitrary contents into the input of the controlling terminal, allowing it to execute arbitrary commands outside of the snap sandbox after the snap exits.
The affected versions of Ubuntu are 16.04, 18.04, 20.04, 22.04, and 22.10.
To fix CVE-2023-1523, update snapd to version 2.58+18.04.1, 2.58+20.04.1, 2.58+22.04.1, 2.58+22.10.1, 2.59.1+23.04ubuntu1.1, 2.59.5-1, or 2.54.3+16.04.0ubuntu0.1~ depending on your system's version.