First published: Thu Dec 01 2022(Updated: )
The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing the private /tmp mount for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/snapd | <2.57.5+22.10ubuntu0.1 | 2.57.5+22.10ubuntu0.1 |
=22.10 | ||
All of | ||
ubuntu/snapd | <2.57.5+22.04ubuntu0.1 | 2.57.5+22.04ubuntu0.1 |
=22.04 | ||
All of | ||
ubuntu/snapd | <2.57.5+20.04ubuntu0.1 | 2.57.5+20.04ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/snapd | <2.57.5+18.04ubuntu0.1 | 2.57.5+18.04ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/snapd | <2.54.3+16.04.0ubuntu0.1~esm5 | 2.54.3+16.04.0ubuntu0.1~esm5 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.