snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Snapd | Canonical | * | 2.54.2 (including) | 
| Snapd | Ubuntu | bionic | * | 
| Snapd | Ubuntu | devel | * | 
| Snapd | Ubuntu | esm-infra/bionic | * | 
| Snapd | Ubuntu | esm-infra/focal | * | 
| Snapd | Ubuntu | esm-infra/xenial | * | 
| Snapd | Ubuntu | focal | * | 
| Snapd | Ubuntu | hirsute | * | 
| Snapd | Ubuntu | impish | * | 
| Snapd | Ubuntu | snap | * | 
| Snapd | Ubuntu | trusty/esm | * | 
| Snapd | Ubuntu | upstream | * |