Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11503

Опубликовано: 24 апр. 2019
Источник: debian

Описание

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snapdfixed2.40-1package
snapdno-dsabusterpackage
snapdno-dsastretchpackage

Примечания

  • https://github.com/snapcore/snapd/pull/6642

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

CVSS3: 7.5
nvd
почти 7 лет назад

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

CVSS3: 7.5
github
больше 3 лет назад

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."