First published: Tue Feb 12 2019(Updated: )
Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. On Ubuntu systems with snaps installed, snapd typically will have already automatically refreshed itself to snapd 2.37.1 which is unaffected.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/snapd | <2.35.5+18.10.1 | 2.35.5+18.10.1 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/snapd | <2.34.2+18.04.1 | 2.34.2+18.04.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/snapd | <2.34.2ubuntu0.1 | 2.34.2ubuntu0.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/snapd | <2.34.2~14.04.1 | 2.34.2~14.04.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3887-1 is critical due to the potential for local attackers to gain administrator privileges.
To fix USN-3887-1, upgrade snapd to version 2.35.5+18.10.1 or later for Ubuntu 18.10, 2.34.2+18.04.1 or later for Ubuntu 18.04, 2.34.2ubuntu0.1 or later for Ubuntu 16.04, or 2.34.2~14.04.1 or later for Ubuntu 14.04.
USN-3887-1 affects Ubuntu versions 14.04, 16.04, 18.04, and 18.10 with specific vulnerable versions of snapd.
The vulnerability in USN-3887-1 was discovered by Chris Moberly.
USN-3887-1 allows local attackers to improperly access privileged socket APIs, potentially leading to elevated privileges.