| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2022-3328
Vulnerability Database
go
CVE-2022-3328
Base Score
HIGH
7
CVE-2022-3328
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Vector
LOCAL
Published By
security@ubuntu.com
Published Date
Jan 08, 2024, 18:15
Affected Versions
(1)
github.com/snapcore/snapd
(Go)
Introduced
0
Fixed
2.57.6
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
github.com/snapcore/snapd
(Go)
0
2.57.6
N/A
Weakness Type (CWE)
:
CWE-362
CVSS Metrics
CVSS v3.1
Base Score
7
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
HIGH
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328
https://ubuntu.com/security/notices/USN-5753-1
Base Score
HIGH
7
Weakness Type (CWE)
:
CWE-362
CVSS Metrics
CVSS v3.1
Base Score
7
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
HIGH
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH