CVE-2019-7304

Published: 12 February 2019

Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
snapd
Launchpad, Ubuntu, Debian
Upstream
Released (2.37.1-1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.34.2+18.04.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.34.2ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [2.34.2~14.04.1])

Notes

AuthorNote
jdstrand
introduced in https://github.com/snapcore/snapd/pull/4626
original CRD was 2019-02-06 16:00:00 UTC but delayed due to delayed
Fedora update

References

Bugs