Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845257
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5292-4)
Summary:The remote host is missing an update for the 'snapd' package(s) announced via the USN-5292-4 advisory.
Description:Summary:
The remote host is missing an update for the 'snapd' package(s) announced via the USN-5292-4 advisory.

Vulnerability Insight:
USN-5292-1 fixed a vulnerability in snapd. Unfortunately that update introduced
a regression that could break the fish shell. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)

Affected Software/OS:
'snapd' package(s) on Ubuntu 14.04, Ubuntu 16.04, Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-3155
https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85
https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca
https://ubuntu.com/security/notices/USN-5292-1
Common Vulnerability Exposure (CVE) ID: CVE-2021-4120
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCGHG6LJAVJJ72TMART6A7N4Z6MSTGI7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QTBN7LLZISXIA4KU4UKDR27Q5PXDS2U/
https://bugs.launchpad.net/snapd/+bug/1949368
http://www.openwall.com/lists/oss-security/2022/02/18/2
Common Vulnerability Exposure (CVE) ID: CVE-2021-44730
Debian Security Information: DSA-5080 (Google Search)
https://www.debian.org/security/2022/dsa-5080
http://www.openwall.com/lists/oss-security/2022/02/23/1
Common Vulnerability Exposure (CVE) ID: CVE-2021-44731
http://seclists.org/fulldisclosure/2022/Dec/4
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
http://www.openwall.com/lists/oss-security/2022/02/23/2
http://www.openwall.com/lists/oss-security/2022/11/30/2
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.