CVE-2023-1523

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
canonicalCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
canonicalsnapd
𝑥
< 2.59.5
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
canonicalubuntu_linux
22.04
canonicalubuntu_linux
22.10
canonicalubuntu_linux
23.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snapd
bullseye (security)
vulnerable
bullseye
no-dsa
bookworm
no-dsa
buster
no-dsa
trixie
2.65.3-1
fixed
sid
2.66.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
lunar
Fixed 2.59.1+23.04ubuntu1.1
released
kinetic
Fixed 2.58+22.10.1
released
jammy
Fixed 2.58+22.04.1
released
focal
Fixed 2.58+20.04.1
released
bionic
Fixed 2.58+18.04.1
released
xenial
Fixed 2.54.3+16.04.0ubuntu0.1~esm6
released
trusty
ignored