The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security announce CVE-2019-7304

snapd: privilege escalation via Socket Access Control

Synthesis of the vulnerability

An attacker can bypass restrictions via Socket Access Control of snapd, in order to escalate his privileges.
Severity of this bulletin: 2/4.
Creation date: 13/02/2019.
Références of this threat: CVE-2019-7304, USN-3887-1, VIGILANCE-VUL-28497.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass restrictions via Socket Access Control of snapd, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

This threat impacts software or systems such as Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this cybersecurity bulletin.

Solutions for this threat

Ubuntu: new snapd packages.
New packages are available:
  Ubuntu 18.10: snapd 2.35.5+18.10.1
  Ubuntu 18.04 LTS: snapd 2.34.2+18.04.1
  Ubuntu 16.04 LTS: snapd 2.34.2ubuntu0.1
  Ubuntu 14.04 LTS: snapd 2.34.2~14.04.1

Wind River Linux: solution (21/05/2019).
The solution is indicated in information sources.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability patch. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.