CVE-2021-44730

snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
canonicalCNA
7.8 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
VendorProductVersion
canonicalsnapd
𝑥
≤ 2.54.2
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
canonicalubuntu_linux
21.10
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snapd
bullseye (security)
2.49-1+deb11u2
fixed
bullseye
2.49-1+deb11u2
fixed
bookworm
2.57.6-1
fixed
sid
2.65.3-1
fixed
trixie
2.65.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
impish
Fixed 2.54.3+21.10.1
released
hirsute
ignored
focal
Fixed 2.54.3+20.04
released
bionic
Fixed 2.54.3+18.04
released
xenial
Fixed 2.54.3+16.04~esm2
released
trusty
Fixed 2.54.3+14.04~esm1
released