{"id":"CVE-2021-44731","details":"A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1","modified":"2026-05-18T05:53:10.564149936Z","published":"2022-02-17T23:15:07.473Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"20.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"21.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"10.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"11.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"34"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"35"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QTBN7LLZISXIA4KU4UKDR27Q5PXDS2U/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGHG6LJAVJJ72TMART6A7N4Z6MSTGI7/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/02/18/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/02/23/2"},{"type":"REPORT","url":"https://www.debian.org/security/2022/dsa-5080"},{"type":"FIX","url":"https://ubuntu.com/security/notices/USN-5292-1"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2022/Dec/4"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/02/23/1"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/11/30/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/canonical/snapd","events":[{"introduced":"0"},{"last_affected":"f6ff602cae4755eb38d1bbb20fa15752cb3b763a"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"2.54.2"}],"cpe":"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["2.54.2","2.54.1","2.54","untagged-ec50ee5bfb45daefc236","2.15.2","2.15","2.14.2.16.04","2.14.1","2.14","2.13","2.12","2.11","2.0.10","2.0.9","2.0.8","2.0.7","2.0.6","2.0.5","2.0.4","2.0.3","2.0","1.9.4","1.9.3","1.9.2","1.9.1","1.9","ppa","1.7.3+20160310ubuntu1","1.7.3+20160308ubuntu1","1.7.3+20160303ubuntu4","1.7.3+20160303ubuntu3","1.7.3+20160303ubuntu2","1.7.3+20160303ubuntu1","1.7.3+20160225ubuntu1","1.7.2+20160223ubuntu1","1.7.2+20160204ubuntu1","1.7.2+20160113ubuntu1","1.7.2ubuntu1","1.7ubuntu1","1.6ubuntu1","1.5ubuntu1","1.4ubuntu1","1.3ubuntu1","1.2-0ubuntu1","1.1.2-0ubuntu1","1.1.1-0ubuntu1","1.1-0ubuntu1","1.0.1-0ubuntu1","1.0-0ubuntu1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-44731.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}