Your submission was sent successfully! Close

CVE-2021-3155

Published: 13 January 2021

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
snapd
Launchpad, Ubuntu, Debian
bionic
Released (2.54.3+18.04)
focal
Released (2.54.3+20.04)
groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish
Released (2.54.3+21.10.1)
precise Does not exist

trusty
Released (2.54.3+14.04~esm1)
upstream
Released (2.54.3)
xenial
Released (2.54.3+16.04~esm2)
Patches:
upstream: https://github.com/snapcore/snapd/pull/9841
upstream: https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85
upstream: https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca