ALT-PU-2022-1765-1
Closed vulnerabilities
BDU:2022-01444
Уязвимость утилиты для управления самодостаточными пакетами snapd, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю повысить свои привилегии в системе и выполнить произвольный код
BDU:2022-01445
Уязвимость утилиты для управления самодостаточными пакетами snapd, связанная с ошибками выполнения многопоточных задач, позволяющая нарушителю выполнить произвольный код с привилегиями root
BDU:2022-01460
Уязвимость утилиты для управления самодостаточными пакетами snapd, связанная с ошибками жестких ссылок, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-3155
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
- https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85
- https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85
- https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca
- https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca
- https://ubuntu.com/security/notices/USN-5292-1
- https://ubuntu.com/security/notices/USN-5292-1
Modified: 2024-11-21
CVE-2021-4120
snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- https://bugs.launchpad.net/snapd/+bug/1949368
- https://bugs.launchpad.net/snapd/+bug/1949368
- FEDORA-2022-82bea71e5a
- FEDORA-2022-82bea71e5a
- FEDORA-2022-5df8b52ba4
- FEDORA-2022-5df8b52ba4
- https://ubuntu.com/security/notices/USN-5292-1
- https://ubuntu.com/security/notices/USN-5292-1
Modified: 2024-11-21
CVE-2021-44730
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- FEDORA-2022-82bea71e5a
- FEDORA-2022-82bea71e5a
- FEDORA-2022-5df8b52ba4
- FEDORA-2022-5df8b52ba4
- https://ubuntu.com/security/notices/USN-5292-1
- https://ubuntu.com/security/notices/USN-5292-1
- DSA-5080
- DSA-5080
Modified: 2024-11-21
CVE-2021-44731
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- [oss-security] 20220218 CVE-2021-4120: Insufficient validation of snap content interface and layout paths
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- [oss-security] 20220223 Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount()
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- FEDORA-2022-82bea71e5a
- FEDORA-2022-82bea71e5a
- FEDORA-2022-5df8b52ba4
- FEDORA-2022-5df8b52ba4
- https://ubuntu.com/security/notices/USN-5292-1
- https://ubuntu.com/security/notices/USN-5292-1
- DSA-5080
- DSA-5080
Closed bugs
Не появляются приложения в меню