Vulnerability Description
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Snapd | <= 2.54.2 |
| Canonical | Ubuntu Linux | 18.04 |
| Fedoraproject | Fedora | 34 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/02/18/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/02/23/1Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://ubuntu.com/security/notices/USN-5292-1PatchVendor Advisory
- https://www.debian.org/security/2022/dsa-5080Issue TrackingThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/02/18/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2022/02/23/1Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://ubuntu.com/security/notices/USN-5292-1PatchVendor Advisory
- https://www.debian.org/security/2022/dsa-5080Issue TrackingThird Party Advisory
FAQ
What is CVE-2021-44730?
CVE-2021-44730 is a vulnerability with a CVSS score of 7.8 (HIGH). snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binar...
How severe is CVE-2021-44730?
CVE-2021-44730 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-44730?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Snapd, Canonical Ubuntu Linux, Fedoraproject Fedora, Debian Debian Linux.