Navigation
Search
|
Dirty_Sock vulnerability in Canonical's snapd could give root access on Linux machines
Wednesday February 13, 2019. 02:56 PM , from BetaNews
A security researcher has discovered a vulnerability in Canonical's snapd package which could be exploited to gain administrator privileges and root access to affected Linux systems. The security issue has been dubbed Dirty_Sock and assigned the code CVE-2019-7304. Chris Moberly found a privilege escalation vulnerability in the snapd API. This is installed by default in Ubuntu -- under which proofs of concept have been tested and found to work '100% of the time on fresh, default installations of Ubuntu Server and Desktop' -- but may also be present in numerous other Linux distros. The Ubuntu CVE Tracker describes the vulnerability… [Continue Reading]
https://betanews.com/2019/02/13/dirty-sock-snapd-linux/
|
25 sources
Current Date
Nov, Fri 22 - 13:45 CET
|