snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Snapd | Canonical | * | 2.54.2 (including) |
Snapd | Ubuntu | bionic | * |
Snapd | Ubuntu | devel | * |
Snapd | Ubuntu | esm-infra/xenial | * |
Snapd | Ubuntu | focal | * |
Snapd | Ubuntu | hirsute | * |
Snapd | Ubuntu | impish | * |
Snapd | Ubuntu | snap | * |
Snapd | Ubuntu | trusty/esm | * |
Snapd | Ubuntu | upstream | * |