Description
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
Published: 2023-09-01
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-23767 Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
Ubuntu USN Ubuntu USN USN-6125-1 snapd vulnerability
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00124}

epss

{'score': 0.00097}


Tue, 01 Oct 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Canonical Snapd Ubuntu Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-10-01T13:08:45.851Z

Reserved: 2023-03-20T17:41:17.600Z

Link: CVE-2023-1523

cve-icon Vulnrichment

Updated: 2024-08-02T05:49:11.645Z

cve-icon NVD

Status : Modified

Published: 2023-09-01T19:15:42.707

Modified: 2024-11-21T07:39:21.537

Link: CVE-2023-1523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses