Privilege escalation via snapd socket

Chris Moberly discovered that snapd in versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket (CVE-2019-7304). A local attacker could use this to access privileged socket APIs and obtain administrator privileges.

Classic Ubuntu systems with snaps installed (eg, Ubuntu 18.04 LTS and higher by default) automatically refresh the core snap and relaunch snapd from the updated core snap. 2.37.1 snaps were released to the stable channel on 2019-02-01 and therefore any classic Ubuntu systems with snaps installed will typically have upgraded to the fixed snapd 2.37.1 by the time this issue went public.

Ubuntu Core systems automatically refresh themselves and reboot whenever updates to snapd are available. 2.37.1 snaps were released to the stable channel on 2019-02-01 and therefore Ubuntu Core systems will typically have upgraded to the fixed snapd 2.37.1 by the time this issue went public.

Timeline

SecurityTeam/KnowledgeBase/SnapSocketParsing (last edited 2019-02-12 17:22:54 by jdstrand)