CVE-2021-3155
Published: 13 January 2021
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Priority
CVSS 3 base score: 5.5
Status
Package | Release | Status |
---|---|---|
snapd Launchpad, Ubuntu, Debian |
bionic |
Released
(2.54.3+18.04)
|
focal |
Released
(2.54.3+20.04)
|
|
groovy |
Ignored
(reached end-of-life)
|
|
hirsute |
Ignored
(reached end-of-life)
|
|
impish |
Released
(2.54.3+21.10.1)
|
|
precise |
Does not exist
|
|
trusty |
Released
(2.54.3+14.04~esm1)
|
|
upstream |
Released
(2.54.3)
|
|
xenial |
Released
(2.54.3+16.04~esm2)
|
|
Patches: upstream: https://github.com/snapcore/snapd/pull/9841 upstream: https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 upstream: https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca |