{"containers":{"cna":{"affected":[{"product":"snapd","vendor":"Canonical","versions":[{"lessThan":"2.37.4","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Jann Horn"}],"datePublic":"2019-03-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-628","description":"CWE-628","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-04-23T15:57:32.000Z","orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical"},"references":[{"tags":["x_refsource_MISC"],"url":"https://usn.ubuntu.com/3917-1/"},{"tags":["x_refsource_MISC"],"url":"https://www.exploit-db.com/exploits/46594"}],"source":{"defect":["https://bugs.launchpad.net/snapd/+bug/1812973"],"discovery":"EXTERNAL"},"title":"Snapd seccomp filter TIOCSTI ioctl bypass","x_generator":{"engine":"Vulnogram 0.0.6"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@ubuntu.com","DATE_PUBLIC":"2019-03-21T07:00:00.000Z","ID":"CVE-2019-7303","STATE":"PUBLIC","TITLE":"Snapd seccomp filter TIOCSTI ioctl bypass"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"snapd","version":{"version_data":[{"version_affected":"<","version_value":"2.37.4"}]}}]},"vendor_name":"Canonical"}]}},"credit":[{"lang":"eng","value":"Jann Horn"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4."}]},"generator":{"engine":"Vulnogram 0.0.6"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-628"}]}]},"references":{"reference_data":[{"name":"https://usn.ubuntu.com/3917-1/","refsource":"MISC","url":"https://usn.ubuntu.com/3917-1/"},{"name":"https://www.exploit-db.com/exploits/46594","refsource":"MISC","url":"https://www.exploit-db.com/exploits/46594"}]},"source":{"defect":["https://bugs.launchpad.net/snapd/+bug/1812973"],"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T20:46:45.956Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://usn.ubuntu.com/3917-1/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.exploit-db.com/exploits/46594"}]}]},"cveMetadata":{"assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","assignerShortName":"canonical","cveId":"CVE-2019-7303","datePublished":"2019-04-23T15:57:32.592Z","dateReserved":"2019-02-01T00:00:00.000Z","dateUpdated":"2024-09-17T01:46:16.086Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}