{"id":29319,"date":"2019-02-13T01:10:22","date_gmt":"2019-02-12T16:10:22","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3887-1-snapd-vulnerability\/"},"modified":"2019-02-13T02:34:19","modified_gmt":"2019-02-12T17:34:19","slug":"usn-3887-1-snapd-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3887-1-snapd-vulnerability\/","title":{"rendered":"USN-3887-1: snapd vulnerability"},"content":{"rendered":"<p>USN-3887-1: snapd vulnerability<\/p>\n<h2 id=\"snapd-vulnerability\">snapd vulnerability<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 18.10<\/li>\n<li>Ubuntu 18.04 LTS<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>snapd could be made to run programs as an administrator.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>snapd &#8211; Daemon and tooling that enable snap packages<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly<br \/>\nvalidated and parsed the remote socket address when performing access<br \/>\ncontrols on its UNIX socket. A local attacker could use this to access<br \/>\nprivileged socket APIs and obtain administrator privileges. On Ubuntu<br \/>\nsystems with snaps installed, snapd typically will have already<br \/>\nautomatically refreshed itself to snapd 2.37.1 which is unaffected.<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 18.10<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\">snapd<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\/2.35.5+18.10.1\">2.35.5+18.10.1<\/a><\/dd>\n<dt>Ubuntu 18.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\">snapd<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\/2.34.2+18.04.1\">2.34.2+18.04.1<\/a><\/dd>\n<dt>Ubuntu 16.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\">snapd<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\/2.34.2ubuntu0.1\">2.34.2ubuntu0.1<\/a><\/dd>\n<dt>Ubuntu 14.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\">snapd<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/snapd\/2.34.2~14.04.1\">2.34.2~14.04.1<\/a><\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>In general, a standard system update will make all the necessary changes.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2019-7304\">CVE-2019-7304<\/a><\/li>\n<li><a href=\"https:\/\/launchpad.net\/bugs\/1813365\">LP: 1813365<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/3887-1\/\" target=\"_blank\">USN-3887-1: snapd vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3887-1: snapd vulnerability snapd vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary snapd could be made to run programs as an administrator. Software Description snapd &#8211; Daemon and tooling that enable snap packages Details Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. On Ubuntu systems with snaps installed, snapd typically will have already automatically refreshed itself to snapd 2.37.1 which is unaffected. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10 snapd &#8211; 2.35.5+18.10.1 Ubuntu 18.04 LTS snapd &#8211; 2.34.2+18.04.1 Ubuntu 16.04 LTS <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3887-1-snapd-vulnerability\/\" title=\"USN-3887-1: snapd vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-29319","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=29319"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29319\/revisions"}],"predecessor-version":[{"id":29320,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/29319\/revisions\/29320"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=29319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=29319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=29319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}