Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2023-1523

Published: 25 May 2023

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

From the Ubuntu Security Team

It was discovered that the snap sandbox did not restrict the use of the ioctl system call with a TIOCLINUX request. This could be exploited by a malicious snap to inject commands into the controlling terminal which would then be executed outside of the snap sandbox once the snap had exited. This could allow an attacker to execute arbitrary commands outside of the confined snap sandbox.

Priority

Medium

Status

Package Release Status
snapd
Launchpad, Ubuntu, Debian
bionic Needed

focal Needed

jammy Needed

kinetic Needed

lunar Needed

trusty Ignored
(out of standard support)
upstream Needed

xenial Needed