Vulnerability Description
snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Snapd | < 2.38 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/04/25/7Third Party Advisory
- https://github.com/snapcore/snapd/commit/bdbfeebef03245176ae0dc323392bb0522a339bPatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2019/04/18/4ExploitMailing ListPatch
- http://www.openwall.com/lists/oss-security/2019/04/25/7Third Party Advisory
- https://github.com/snapcore/snapd/commit/bdbfeebef03245176ae0dc323392bb0522a339bPatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2019/04/18/4ExploitMailing ListPatch
FAQ
What is CVE-2019-11502?
CVE-2019-11502 is a vulnerability with a CVSS score of 7.5 (HIGH). snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp dire...
How severe is CVE-2019-11502?
CVE-2019-11502 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11502?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Snapd.