snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
References
Link | Resource |
---|---|
https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 | Patch Third Party Advisory |
https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca | Patch Third Party Advisory |
https://ubuntu.com/security/notices/USN-5292-1 | Patch Vendor Advisory |
https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 | Patch Third Party Advisory |
https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca | Patch Third Party Advisory |
https://ubuntu.com/security/notices/USN-5292-1 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 - Patch, Third Party Advisory | |
References | () https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca - Patch, Third Party Advisory | |
References | () https://ubuntu.com/security/notices/USN-5292-1 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 3.8 |
Information
Published : 2022-02-17 23:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3155
Mitre link : CVE-2021-3155
CVE.ORG link : CVE-2021-3155
JSON object : View
Products Affected
canonical
- ubuntu_linux
- snapd
CWE
CWE-276
Incorrect Default Permissions