CVE-2019-11503

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
canonicalsnapd
𝑥
< 2.39
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snapd
bullseye (security)
2.49-1+deb11u2
fixed
bullseye
2.49-1+deb11u2
fixed
buster
no-dsa
stretch
no-dsa
bookworm
2.57.6-1
fixed
sid
2.65.3-1
fixed
trixie
2.65.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
eoan
Fixed 2.39.2+19.10ubuntu1
released
disco
Fixed 2.39.2+19.04
released
cosmic
Fixed 2.39.2+18.10
released
bionic
Fixed 2.39.2+18.04
released
xenial
Fixed 2.39.2ubuntu0.2
released
trusty
Fixed 2.43.3~14.04
released