First published: Wed May 31 2023(Updated: )
It was discovered that the snap sandbox did not restrict the use of the ioctl system call with a TIOCLINUX request. This could be exploited by a malicious snap to inject commands into the controlling terminal which would then be executed outside of the snap sandbox once the snap had exited. This could allow an attacker to execute arbitrary commands outside of the confined snap sandbox. Note: graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/snapd | <2.59.1+23.04ubuntu1.1 | 2.59.1+23.04ubuntu1.1 |
=23.04 | ||
All of | ||
ubuntu/snapd | <2.58+22.10.1 | 2.58+22.10.1 |
=22.10 | ||
All of | ||
ubuntu/snapd | <2.58+22.04.1 | 2.58+22.04.1 |
=22.04 | ||
All of | ||
ubuntu/snapd | <2.58+20.04.1 | 2.58+20.04.1 |
=20.04 | ||
All of | ||
ubuntu/snapd | <2.58+18.04.1 | 2.58+18.04.1 |
=18.04 | ||
All of | ||
ubuntu/snapd | <2.54.3+16.04.0ubuntu0.1~esm6 | 2.54.3+16.04.0ubuntu0.1~esm6 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this snapd vulnerability is USN-6125-1.
The snap sandbox did not restrict the use of the ioctl system call with a TIOCLINUX request, allowing a malicious snap to inject commands into the controlling terminal.
The affected software for this vulnerability is Ubuntu with snapd versions 2.59.1+23.04ubuntu1.1, 2.58+22.10.1, 2.58+22.04.1, 2.58+20.04.1, 2.58+18.04.1, and 2.54.3+16.04.0ubuntu0.1~esm6.
This snapd vulnerability can be exploited by a malicious snap to inject commands into the controlling terminal, which will then be executed outside of the snap sandbox once the snap has exited.
More information about this snapd vulnerability can be found on the Ubuntu website and Launchpad.