Ubuntu 3917-1: snapd vulnerability

    Date21 Mar 2019
    Posted ByLinuxSecurity Advisories
    An intended access restriction in snapd could be bypassed by strict modesnaps on 64 bit architectures.
    Ubuntu Security Notice USN-3917-1
    March 21, 2019
    snapd vulnerability
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 18.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    An intended access restriction in snapd could be bypassed by strict mode
    snaps on 64 bit architectures.
    Software Description:
    - snapd: Daemon and tooling that enable snap packages
    The snapd default seccomp filter for strict mode snaps blocks the use of
    the ioctl() system call when used with TIOCSTI as the second argument to
    the system call. Jann Horn discovered that this restriction could be
    circumvented on 64 bit architectures. A malicious snap could exploit this
    to bypass intended access restrictions to insert characters into the
    terminal's input queue. On Ubuntu, snapd typically will have already
    automatically refreshed itself to snapd 2.37.4 which is unaffected.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 18.10:
      snapd                           2.37.4+18.10.1
    Ubuntu 18.04 LTS:
      snapd                           2.37.4+18.04.1
    Ubuntu 16.04 LTS:
      snapd                           2.37.4ubuntu0.1
    Ubuntu 14.04 LTS:
      snapd                           2.37.4~14.04.1
    In general, a standard system update will make all the necessary changes.
      CVE-2019-7303, https://launchpad.net/bugs/1812973
    Package Information:
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.