Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-1523

Опубликовано: 01 сент. 2023
Источник: debian
EPSS Низкий

Описание

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snapdfixed2.59.5-1package
snapdno-dsabookwormpackage
snapdno-dsabullseyepackage
snapdno-dsabusterpackage

Примечания

  • Preparation: https://github.com/snapcore/snapd/commit/e4681c57bd5805c8d2dec5c3ddf7d85ebf1d2c4c (2.59.5)

  • Fixed by: https://github.com/snapcore/snapd/commit/dddcfd6ac8daa84feb80eb6fd88f852ced70629c (2.59.5)

  • Fixed by: https://github.com/snapcore/snapd/commit/52af545f3c0d8b086500ab86f161703905638951 (2.59.5)

  • Tests: https://github.com/snapcore/snapd/commit/e5e823b442aec364e81c9cb805dc2fce34c41b8b (2.59.5)

  • Tests: https://github.com/snapcore/snapd/commit/8ad5a73e753828175c9fbbf03e518bb42d773979 (2.59.5)

  • Tests: https://github.com/snapcore/snapd/commit/64cf6b0048385d921b25361d55ddfd524880c738 (2.59.5)

  • Tests: https://github.com/snapcore/snapd/commit/2e93f91e1350f965a356748a3ddcff275207df12 (2.59.5)

  • Tests: https://github.com/snapcore/snapd/commit/390dc62a71884c0463e2411fb13f5bd5abdc7442 (2.59.5)

EPSS

Процентиль: 32%
0.00124
Низкий

Связанные уязвимости

CVSS3: 10
ubuntu
больше 2 лет назад

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

CVSS3: 10
nvd
больше 2 лет назад

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

CVSS3: 10
github
больше 2 лет назад

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

EPSS

Процентиль: 32%
0.00124
Низкий