{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "bdbfeebef03245176ae0dc323392bb0522a339b1"
            }
          ],
          "repo": "https://github.com/canonical/snapd",
          "type": "GIT"
        },
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "2.38"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7d3222250d98ff1baf8ad4e7df283b40a35d960c"
            }
          ],
          "repo": "https://github.com/snapcore/snapd",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.",
  "id": "CVE-2019-11502",
  "modified": "2026-04-01T23:10:17.690266169Z",
  "published": "2019-04-24T21:29:00.727Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "http://www.openwall.com/lists/oss-security/2019/04/25/7"
    },
    {
      "type": "FIX",
      "url": "https://www.openwall.com/lists/oss-security/2019/04/18/4"
    },
    {
      "type": "FIX",
      "url": "https://github.com/snapcore/snapd/commit/bdbfeebef03245176ae0dc323392bb0522a339b1"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ]
}