7.5
CVSSv3

CVE-2019-11502

Published: 24/04/2019 Updated: 02/05/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

snap-confine in snapd prior to 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical snapd

Vendor Advisories

Debian Bug report logs - #928052 CVE-2019-11502 CVE-2019-11503 Package: src:snapd; Maintainer for src:snapd is Michael Hudson-Doyle <mwhudson@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 26 Apr 2019 21:09:01 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Found in vers ...