Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-7303

Опубликовано: 23 апр. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

РелизСтатусПримечание
bionic

released

2.37.4+18.04.1
cosmic

released

2.37.4+18.10
devel

not-affected

2.37.4+19.04
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [2.37.4~14.04.1]]
esm-infra/bionic

released

2.37.4+18.04.1
esm-infra/xenial

released

2.37.4ubuntu0.1
precise/esm

DNE

trusty

released

2.37.4~14.04.1
trusty/esm

DNE

trusty was released [2.37.4~14.04.1]
upstream

released

2.37.4

Показывать по

EPSS

Процентиль: 78%
0.01122
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 7 лет назад

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

CVSS3: 7.5
debian
почти 7 лет назад

A vulnerability in the seccomp filters of Canonical snapd before versi ...

github
больше 3 лет назад

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

CVSS3: 3.3
fstec
около 7 лет назад

Уязвимость утилиты для управления самодостаточными пакетами snapd, связанная с небезопасным управлением привилегиями, позволяющая нарушителю обойти существующие ограничения доступа

EPSS

Процентиль: 78%
0.01122
Низкий

5 Medium

CVSS2

7.5 High

CVSS3