Vulnerabilities
Vulnerable Software
Canonical:  >> Snapd  >> 0.2  Security Vulnerabilities
snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
CVSS Score
7.5
EPSS Score
0.006
Published
2019-04-24
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
CVSS Score
7.5
EPSS Score
0.005
Published
2019-04-24
A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.
CVSS Score
5.7
EPSS Score
0.008
Published
2019-04-23
Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.
CVSS Score
8.8
EPSS Score
0.845
Published
2019-04-23


Contact Us

Shodan ® - All rights reserved