Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3155

Опубликовано: 17 фев. 2022
Источник: debian
EPSS Низкий

Описание

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snapdfixed2.54-1package
snapdno-dsabullseyepackage
snapdno-dsabusterpackage

Примечания

  • https://github.com/snapcore/snapd/pull/9841

  • https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 (2.52)

  • https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca (2.54)

EPSS

Процентиль: 8%
0.00028
Низкий

Связанные уязвимости

CVSS3: 3.8
ubuntu
почти 4 года назад

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

CVSS3: 3.8
nvd
почти 4 года назад

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

github
почти 4 года назад

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

EPSS

Процентиль: 8%
0.00028
Низкий