UBUNTU-CVE-2019-7303

Source
https://ubuntu.com/security/CVE-2019-7303
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-7303.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-7303
Upstream
Downstream
Related
Published
2019-03-21T00:00:00Z
Modified
2026-01-30T00:50:53.618332Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 5.7 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

References

Affected packages

Ubuntu:14.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.37.4~14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.37.4~14.04.1

Affected versions

2.*
2.21~14.04.2
2.22.2~14.04
2.22.3~14.04
2.22.6~14.04
2.23.1~14.04
2.24.1~14.04
2.25~14.04
2.26.10~14.04
2.27.5~14.04
2.28.5~14.04
2.29.4.2~14.04
2.32.3.2~14.04
2.32.9~14.04
2.33.1~14.04
2.34.2~14.04
2.34.2~14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-snapcore-snapd-dev",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "golang-github-ubuntu-core-snappy-dev",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "snap-confine",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "snapd",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "snapd-xdg-open",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "ubuntu-core-launcher",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "ubuntu-core-snapd-units",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "ubuntu-snappy",
            "binary_version": "2.37.4~14.04.1"
        },
        {
            "binary_name": "ubuntu-snappy-cli",
            "binary_version": "2.37.4~14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-7303.json"

Ubuntu:16.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.37.4ubuntu0.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.37.4ubuntu0.1

Affected versions

1.*
1.9
1.9.1.1
1.9.2
2.*
2.0
2.0.1
2.0.2
2.0.3
2.0.5
2.0.8
2.0.9
2.0.10
2.11+0.16.04
2.12+0.16.04
2.13
2.14.2~16.04
2.15.2ubuntu1
2.16ubuntu3
2.17.1ubuntu1
2.20.1ubuntu1
2.21
2.22.2
2.22.3
2.22.6
2.23.1
2.24.1
2.25
2.26.10
2.27.5
2.28.5
2.29.4.2
2.32.3.2
2.32.9
2.33.1ubuntu2
2.34.2
2.34.2ubuntu0.1
2.37.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-snapcore-snapd-dev",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "golang-github-ubuntu-core-snappy-dev",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "snap-confine",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "snapd",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "snapd-xdg-open",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "ubuntu-core-launcher",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "ubuntu-core-snapd-units",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "ubuntu-snappy",
            "binary_version": "2.37.4ubuntu0.1"
        },
        {
            "binary_name": "ubuntu-snappy-cli",
            "binary_version": "2.37.4ubuntu0.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-7303.json"

Ubuntu:18.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.37.4+18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.37.4+18.04.1

Affected versions

2.*
2.28.5+17.10
2.29.4.1+18.04
2.29.4.2+18.04
2.31.1+18.04
2.32+18.04~pre5
2.32+18.04~pre6
2.32+18.04
2.32.3.2+18.04
2.32.5+18.04
2.32.8+18.04
2.32.9+18.04
2.33.1+18.04ubuntu2
2.34.2+18.04
2.34.2+18.04.1
2.37.1+18.04
2.37.1.1+18.04
2.37.4+18.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-snapcore-snapd-dev",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "golang-github-ubuntu-core-snappy-dev",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "snap-confine",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "snapd",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "snapd-xdg-open",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "ubuntu-core-launcher",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "ubuntu-core-snapd-units",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "ubuntu-snappy",
            "binary_version": "2.37.4+18.04.1"
        },
        {
            "binary_name": "ubuntu-snappy-cli",
            "binary_version": "2.37.4+18.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-7303.json"