Ubuntu Security Notice USN-3887-1

Discussion in 'News Aggregator' started by Packet Storm, 13 Feb 2019.

  1. Packet Storm

    Packet Storm Guest

    Ubuntu Security Notice 3887-1 - Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. On Ubuntu systems with snaps installed, snapd typically will have already automatically refreshed itself to snapd 2.37.1 which is unaffected.

    Continue reading...
     

Share This Page

Loading...