8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
28.2%
Vulnerability in snapdβs snap packet management daemon, related to insufficient validation of interface
snapd content and layout paths. Exploitation of the vulnerability could allow an attacker to enforce
arbitrary AppArmor policy rules through a corrupted content interface and layout declarations and
execute arbitrary code with elevated privileges
Vulnerability in the snapd snap package management daemon, related to the race condition in the binary
snap-confine when preparing a private mount namespace. Exploitation of the vulnerability could
allow an attacker to bind their own content within the snap private mount namespace
and execute arbitrary code with root privileges
The vulnerability in the snapd package management daemon, snapd, is due to hard linking errors in the binary file
snap-confine. Exploitation of the vulnerability could allow an attacker to create a hard link to system
binaries and execute them with elevated privileges
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
28.2%