CVE-2019-7304

Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
canonicalCNA
8.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
canonicalsnapd
𝑥
< 2.37.1
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snapd
bullseye
2.49-1+deb11u2
fixed
bullseye (security)
2.49-1+deb11u2
fixed
stretch
not-affected
bookworm
2.57.6-1
fixed
sid
2.65.3-1
fixed
trixie
2.65.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
cosmic
Fixed 2.35.5+18.10.1
released
bionic
Fixed 2.34.2+18.04.1
released
xenial
Fixed 2.34.2ubuntu0.1
released
trusty
Fixed 2.34.2~14.04.1
released