UBUNTU-CVE-2019-11503

Source
https://ubuntu.com/security/CVE-2019-11503
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11503.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-11503
Upstream
Published
2019-04-24T21:29:00Z
Modified
2025-09-08T16:45:24Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

References

Affected packages

Ubuntu:16.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.39.2ubuntu0.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.39.2ubuntu0.2

Affected versions

1.*
1.9
1.9.1.1
1.9.2
2.*
2.0
2.0.1
2.0.2
2.0.3
2.0.5
2.0.8
2.0.9
2.0.10
2.11+0.16.04
2.12+0.16.04
2.13
2.14.2~16.04
2.15.2ubuntu1
2.16ubuntu3
2.17.1ubuntu1
2.20.1ubuntu1
2.21
2.22.2
2.22.3
2.22.6
2.23.1
2.24.1
2.25
2.26.10
2.27.5
2.28.5
2.29.4.2
2.32.3.2
2.32.9
2.33.1ubuntu2
2.34.2
2.34.2ubuntu0.1
2.37.4
2.37.4ubuntu0.1
2.38
2.39.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.39.2ubuntu0.2",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11503.json"

Ubuntu:18.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.39.2+18.04?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.39.2+18.04

Affected versions

2.*
2.28.5+17.10
2.29.4.1+18.04
2.29.4.2+18.04
2.31.1+18.04
2.32+18.04~pre5
2.32+18.04~pre6
2.32+18.04
2.32.3.2+18.04
2.32.5+18.04
2.32.8+18.04
2.32.9+18.04
2.33.1+18.04ubuntu2
2.34.2+18.04
2.34.2+18.04.1
2.37.1+18.04
2.37.1.1+18.04
2.37.4+18.04
2.37.4+18.04.1
2.38+18.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.39.2+18.04",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11503.json"