First published: Wed Nov 30 2022(Updated: )
Race condition in snap-confine's `must_mkdir_and_open_with_perms()`
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/snapd | <2.57.5+18.04ubuntu0.1 | 2.57.5+18.04ubuntu0.1 |
ubuntu/snapd | <2.57.5+20.04ubuntu0.1 | 2.57.5+20.04ubuntu0.1 |
ubuntu/snapd | <2.57.5+22.04ubuntu0.1 | 2.57.5+22.04ubuntu0.1 |
ubuntu/snapd | <2.57.5+22.10ubuntu0.1 | 2.57.5+22.10ubuntu0.1 |
ubuntu/snapd | <2.61.1 | 2.61.1 |
ubuntu/snapd | <2.54.3+16.04.0ubuntu0.1~ | 2.54.3+16.04.0ubuntu0.1~ |
go/github.com/snapcore/snapd | <2.57.6 | 2.57.6 |
debian/snapd | 2.49-1+deb11u2 2.57.6-1 2.63-4 2.65.1-1 | |
snapd | <2.61.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =22.04 | |
Ubuntu | =22.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3328 has been classified as a moderate severity vulnerability.
To fix CVE-2022-3328, update your 'snapd' package to version 2.57.5+18.04ubuntu0.1, 2.57.5+20.04ubuntu0.1, 2.57.5+22.04ubuntu0.1, or later.
CVE-2022-3328 affects 'snapd' versions prior to 2.57.5+18.04ubuntu0.1, 2.57.5+20.04ubuntu0.1, 2.57.5+22.04ubuntu0.1, and others.
CVE-2022-3328 primarily affects Ubuntu operating systems utilizing the 'snapd' package.
The recommended approach for CVE-2022-3328 is to apply the necessary updates, as alternative solutions may not fully mitigate the vulnerability.