CVE-2021-3155

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*

History

25 Feb 2022, 21:32

Type Values Removed Values Added
References (MISC) https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca - (MISC) https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca - Patch, Third Party Advisory
References (MISC) https://ubuntu.com/security/notices/USN-5292-1 - (MISC) https://ubuntu.com/security/notices/USN-5292-1 - Patch, Vendor Advisory
References (MISC) https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 - (MISC) https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 - Patch, Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
CWE CWE-276
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
First Time Canonical ubuntu Linux
Canonical snapd
Canonical

17 Feb 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-17 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-3155

Mitre link : CVE-2021-3155

CVE.ORG link : CVE-2021-3155


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • snapd
CWE
CWE-276

Incorrect Default Permissions