Описание
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.39.2+18.04 |
| cosmic | released | 2.39.2+18.10 |
| devel | not-affected | 2.41+19.04 |
| disco | released | 2.39.2+19.04 |
| eoan | released | 2.39.2+19.10ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was released [2.43.3~14.04] |
| esm-infra/bionic | released | 2.39.2+18.04 |
| esm-infra/xenial | released | 2.39.2ubuntu0.2 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
snap-confine as included in snapd before 2.39 did not guard against sy ...
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
5 Medium
CVSS2
7.5 High
CVSS3