Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-3155
Analyzed
More InfoOfficial Page
Source-security@ubuntu.com
View Known Exploited Vulnerability (KEV) details
Published At-17 Feb, 2022 | 23:15
Updated At-25 Feb, 2022 | 21:32

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.13.8LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Canonical Ltd.
canonical
>>snapd>>Versions before 2.54.3(exclusive)
cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>20.04
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>21.10
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-276Primarynvd@nist.gov
CWE-276Secondarysecurity@ubuntu.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85security@ubuntu.com
Patch
Third Party Advisory
https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dccasecurity@ubuntu.com
Patch
Third Party Advisory
https://ubuntu.com/security/notices/USN-5292-1security@ubuntu.com
Patch
Vendor Advisory
Change History
0Changes found

Details not found