First published: Wed Feb 10 2021(Updated: )
Gilad Reti and Nimrod Stoler discovered that snapd did not correctly specify cgroup delegation when generating systemd service units for various container management snaps. This could allow a local attacker to escalate privileges via access to arbitrary devices of the container host from within a compromised or malicious container.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/snapd | <2.48.3+20.10 | 2.48.3+20.10 |
Ubuntu | =20.10 | |
All of | ||
ubuntu/snapd | <2.48.3+20.04 | 2.48.3+20.04 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/snapd | <2.48.3+18.04 | 2.48.3+18.04 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/snapd | <2.48.3 | 2.48.3 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4728-1 is classified as high due to the potential for privilege escalation.
To fix USN-4728-1, update the snapd package to version 2.48.3 for your respective Ubuntu version.
USN-4728-1 affects snapd versions prior to 2.48.3 for Ubuntu 20.10, 20.04, 18.04, and 16.04.
The vulnerability in USN-4728-1 was discovered by researchers Gilad Reti and Nimrod Stoler.
USN-4728-1 mitigates a local privilege escalation attack through improper cgroup delegation in container management.