UBUNTU-CVE-2019-11502

Source
https://ubuntu.com/security/CVE-2019-11502
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11502.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-11502
Upstream
Published
2019-04-24T21:29:00Z
Modified
2025-09-08T16:45:24Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.

References

Affected packages

Ubuntu:14.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.38~14.04?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38~14.04

Affected versions

2.*
2.21~14.04.2
2.22.2~14.04
2.22.3~14.04
2.22.6~14.04
2.23.1~14.04
2.24.1~14.04
2.25~14.04
2.26.10~14.04
2.27.5~14.04
2.28.5~14.04
2.29.4.2~14.04
2.32.3.2~14.04
2.32.9~14.04
2.33.1~14.04
2.34.2~14.04
2.34.2~14.04.1
2.37.4~14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.38~14.04",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.38~14.04",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11502.json"

Ubuntu:16.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.38?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38

Affected versions

1.*
1.9
1.9.1.1
1.9.2
2.*
2.0
2.0.1
2.0.2
2.0.3
2.0.5
2.0.8
2.0.9
2.0.10
2.11+0.16.04
2.12+0.16.04
2.13
2.14.2~16.04
2.15.2ubuntu1
2.16ubuntu3
2.17.1ubuntu1
2.20.1ubuntu1
2.21
2.22.2
2.22.3
2.22.6
2.23.1
2.24.1
2.25
2.26.10
2.27.5
2.28.5
2.29.4.2
2.32.3.2
2.32.9
2.33.1ubuntu2
2.34.2
2.34.2ubuntu0.1
2.37.4
2.37.4ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.38",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.38",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.38",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.38",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.38",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.38",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.38",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.38",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.38",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11502.json"

Ubuntu:18.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.38+18.04?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38+18.04

Affected versions

2.*
2.28.5+17.10
2.29.4.1+18.04
2.29.4.2+18.04
2.31.1+18.04
2.32+18.04~pre5
2.32+18.04~pre6
2.32+18.04
2.32.3.2+18.04
2.32.5+18.04
2.32.8+18.04
2.32.9+18.04
2.33.1+18.04ubuntu2
2.34.2+18.04
2.34.2+18.04.1
2.37.1+18.04
2.37.1.1+18.04
2.37.4+18.04
2.37.4+18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.38+18.04",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.38+18.04",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11502.json"