445
VMScore

CVE-2019-11503

Published: 24/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

snap-confine as included in snapd prior to 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical snapd

Vendor Advisories

Debian Bug report logs - #928052 CVE-2019-11502 CVE-2019-11503 Package: src:snapd; Maintainer for src:snapd is Michael Hudson-Doyle <mwhudson@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 26 Apr 2019 21:09:01 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Found in vers ...