{"id":"CVE-2021-44730","details":"snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1","modified":"2026-05-18T05:55:39.962802185Z","published":"2022-02-17T23:15:07.413Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"18.04"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"20.04"}]},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"21.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"10.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"11.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"34"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"35"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QTBN7LLZISXIA4KU4UKDR27Q5PXDS2U/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGHG6LJAVJJ72TMART6A7N4Z6MSTGI7/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/02/18/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/02/23/1"},{"type":"REPORT","url":"https://www.debian.org/security/2022/dsa-5080"},{"type":"FIX","url":"https://ubuntu.com/security/notices/USN-5292-1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/canonical/snapd","events":[{"introduced":"0"},{"last_affected":"f6ff602cae4755eb38d1bbb20fa15752cb3b763a"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.54.2"}]}}],"versions":["2.54.2","2.54.1","2.54","untagged-ec50ee5bfb45daefc236","2.15.2","2.15","2.14.2.16.04","2.14.1","2.14","2.13","2.12","2.11","2.0.10","2.0.9","2.0.8","2.0.7","2.0.6","2.0.5","2.0.4","2.0.3","2.0","1.9.4","1.9.3","1.9.2","1.9.1","1.9","ppa","1.7.3+20160310ubuntu1","1.7.3+20160308ubuntu1","1.7.3+20160303ubuntu4","1.7.3+20160303ubuntu3","1.7.3+20160303ubuntu2","1.7.3+20160303ubuntu1","1.7.3+20160225ubuntu1","1.7.2+20160223ubuntu1","1.7.2+20160204ubuntu1","1.7.2+20160113ubuntu1","1.7.2ubuntu1","1.7ubuntu1","1.6ubuntu1","1.5ubuntu1","1.4ubuntu1","1.3ubuntu1","1.2-0ubuntu1","1.1.2-0ubuntu1","1.1.1-0ubuntu1","1.1-0ubuntu1","1.0.1-0ubuntu1","1.0-0ubuntu1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-44730.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}