CVE-2021-3155
Summary
| CVE | CVE-2021-3155 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-17 23:15:00 UTC |
| Updated | 2022-02-25 21:32:00 UTC |
| Description | snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Merge pull request #9897 from anonymouse64/bugfix/lp-1910298-part-1 · snapcore/snapd@6bcaeec · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| USN-5292-1: snapd vulnerabilities | Ubuntu security notices | Ubuntu |
MISC |
ubuntu.com |
Patch, Vendor Advisory |
| Merge pull request #10992 from MiguelPires/fix-snap-perm · snapcore/snapd@7d2a966 · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: James Troup
Legacy QID Mappings
- 182790 Debian Security Update for snapd (CVE-2021-3155)
- 198668 Ubuntu Security Notification for snapd Vulnerabilities (USN-5292-1)
- 198670 Ubuntu Security Notification for snapd Vulnerabilities (USN-5292-2)