First published: Thu Dec 01 2022(Updated: )
The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing the private /tmp mount for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/snapd | <2.57.5+22.10ubuntu0.1 | 2.57.5+22.10ubuntu0.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/snapd | <2.57.5+22.04ubuntu0.1 | 2.57.5+22.04ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/snapd | <2.57.5+20.04ubuntu0.1 | 2.57.5+20.04ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/snapd | <2.57.5+18.04ubuntu0.1 | 2.57.5+18.04ubuntu0.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/snapd | <2.54.3+16.04.0ubuntu0.1~esm5 | 2.54.3+16.04.0ubuntu0.1~esm5 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-5753-1 is a high severity vulnerability due to the risk of privilege escalation and arbitrary code execution.
To fix USN-5753-1, update the snapd package to version 2.57.5+22.10ubuntu0.1 or later.
USN-5753-1 affects Ubuntu versions 22.10, 22.04, 20.04, 18.04, and 16.04.
USN-5753-1 is a race condition vulnerability in the snapd snap-confine binary.
Yes, a local attacker could potentially exploit USN-5753-1 to escalate privileges.