canonical snapd CVE-2019-7304 vulnerability in Canonical Products
Published on April 23, 2019

Local privilege escalation via snapd socket
Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.

NVD


Products Associated with CVE-2019-7304

stack.watch emails you whenever new vulnerabilities are published in Canonical Snapd or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

Canonical snapd:

Exploit Probability

EPSS
82.80%
Percentile
99.22%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.