Function Call with Incorrectly Specified Arguments Affecting snapd package, versions <2.37.4-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.78% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-SNAPD-345898
  • published22 Mar 2019
  • disclosed23 Apr 2019

Introduced: 22 Mar 2019

CVE-2019-7303  (opens in a new tab)
CWE-628  (opens in a new tab)

How to fix?

Upgrade Debian:unstable snapd to version 2.37.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream snapd package and not the snapd package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

CVSS Scores

version 3.1