Vulnerability Description
A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Snapd | < 2.37.4 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- https://usn.ubuntu.com/3917-1/Third Party Advisory
- https://www.exploit-db.com/exploits/46594ExploitThird Party AdvisoryVDB Entry
- https://usn.ubuntu.com/3917-1/Third Party Advisory
- https://www.exploit-db.com/exploits/46594ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2019-7303?
CVE-2019-7303 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to mat...
How severe is CVE-2019-7303?
CVE-2019-7303 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7303?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Snapd, Canonical Ubuntu Linux.