CVE-2019-11502Link Following in Snapd

CWE-59Link Following6 documents6 sources
Severity
7.5HIGHNVD
EPSS
0.6%
top 31.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 24
Latest updateMay 24

Description

snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDcanonical/snapd< 2.38
Debiansnapcraft/snapd< 2.40-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hhc7-jq5j-875q: snap-confine in snapd before 22022-05-24
OSV
CVE-2019-11502: snap-confine in snapd before 22019-04-24
CVEList
CVE-2019-11502: snap-confine in snapd before 22019-04-24

📋Vendor Advisories

1
Debian
CVE-2019-11502: snapd - snap-confine in snapd before 2.38 incorrectly set the ownership of a snap applic...2019

💬Community

1
Bugzilla
CVE-2019-11502 snapd: incorrect setting of ownership leads to access private /tmp directory2019-04-30
CVE-2019-11502 — Link Following in Canonical Snapd | cvebase