Snapd flaw lets attackers gain root access on Linux systems

Report Bugs, Issues and non- package Requests
Post Reply
Message
Author
User avatar
colin_b
Posts: 452
Joined: Sun Mar 19, 2017 7:21 pm

Snapd flaw lets attackers gain root access on Linux systems

#1 Post by colin_b »

https://thehackernews.com/2019/02/snapd ... ation.html
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious program to obtain root privileges and total control over the targeted system.

Dubbed "Dirty_Sock" and identified as CVE-2019-7304, the vulnerability was discovered by security researcher Chris Moberly, who privately disclosed it to Canonical, the maker of Ubuntu, late last month.

The vulnerability resides in the REST API for snapd service, a universal Linux packaging system that makes an application compatible for various Linux distributions without requiring any modification.

Built by Canonical, snapd comes by default installed on all versions of Ubuntu and also used by other Linux distributions, including Debian, OpenSUSE, Arch Linux, Solus, and Fedora.



mod note Eadwine: Edited, please don't capitalize every word

User avatar
Adrian
Developer
Posts: 8267
Joined: Wed Jul 12, 2006 1:42 am

Re: Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

#2 Post by Adrian »

Thankfully is not installed by default on MX.

User avatar
anticapitalista
Developer
Posts: 4166
Joined: Sat Jul 15, 2006 10:40 am

Re: Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

#3 Post by anticapitalista »

Adrian wrote: Thu Feb 14, 2019 8:46 pm Thankfully is not installed by default on MX.
... and since it requires systemd, it will never be installed or supported on antiX.
anticapitalista
Reg. linux user #395339.

Philosophers have interpreted the world in many ways; the point is to change it.

antiX with runit - lean and mean.
https://antixlinux.com

Post Reply

Return to “Bugs and Non-Package Requests Forum”