Описание
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
Ссылки
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListPatchThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.39 (исключая)
cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00475
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-59
Связанные уязвимости
CVSS3: 7.5
ubuntu
почти 7 лет назад
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
CVSS3: 7.5
debian
почти 7 лет назад
snap-confine as included in snapd before 2.39 did not guard against sy ...
CVSS3: 7.5
github
больше 3 лет назад
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
EPSS
Процентиль: 64%
0.00475
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-59