CVE-2021-4120

NameCVE-2021-4120
Descriptionsnapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
snapd (PTS)stretch (security)2.21-2+deb9u1vulnerable
stretch (lts), stretch2.21-2+deb9u3vulnerable
buster (security), buster, buster (lts)2.37.4-1+deb10u3vulnerable
bullseye (security), bullseye2.49-1+deb11u2fixed
bookworm2.57.6-1fixed
trixie2.65.3-1fixed
sid2.66.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
snapdsourcebullseye2.49-1+deb11u1
snapdsource(unstable)2.54.3-1

Notes

[buster] - snapd <ignored> (Minor issue, intrusive backport)
https://bugs.launchpad.net/snapd/+bug/1949368
https://www.openwall.com/lists/oss-security/2022/02/18/2
[stretch] - snapd <ignored> (Minor issue, too intrusive to backport)

Search for package or bug name: Reporting problems