CVE-2019-7304 vulnerability in Canonical Products
Published on April 23, 2019
Local privilege escalation via snapd socket
Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.
Products Associated with CVE-2019-7304
stack.watch emails you whenever new vulnerabilities are published in Canonical Snapd or Canonical Ubuntu Linux. Just hit a watch button to start following.
Affected Versions
Canonical snapd:- Version unspecified and below 2.37.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.