[USN-5292-1] snapd vulnerabilities

Paulo Flabiano Smorigo pfsmorigo at canonical.com
Thu Feb 17 20:14:17 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5292-1
February 17, 2022

snapd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in snapd.

Software Description:
- snapd: Daemon and tooling that enable snap packages

Details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  snap-confine                    2.54.3+21.10.1
  snapd                           2.54.3+21.10.1

Ubuntu 20.04 LTS:
  snap-confine                    2.54.3+20.04
  snapd                           2.54.3+20.04

Ubuntu 18.04 LTS:
  snap-confine                    2.54.3+18.04
  snapd                           2.54.3+18.04

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5292-1
  CVE-2021-3155, CVE-2021-4120, CVE-2021-44730, CVE-2021-44731

Package Information:
  https://launchpad.net/ubuntu/+source/snapd/2.54.3+21.10.1
  https://launchpad.net/ubuntu/+source/snapd/2.54.3+20.04
  https://launchpad.net/ubuntu/+source/snapd/2.54.3+18.04
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220217/337883fe/attachment.sig>


More information about the ubuntu-security-announce mailing list