Gain root privileges through vulnerabilities in the Snap software distribution system
users can install custom software packages that are more up-to-date than the original versions from the distribution’s proprietary package sources. To do this Gain root privileges through vulnerabilities in the Snap software distribution system Attackers may abuse Snap’s software distribution system vulnerabilities to gain root privileges in the system – for example Explode Before the current version 2.54.3. Ubuntu hat in einem Security-Advisory Lists updated packages for different distribution versions. Since Snap is also offered by many other distributions detailed how the researchers tracked down the escalation vulnerabilities and developed a proof-of-concept vulnerability for them. Affected versions Errors can be found in Explode they can get root privileges by hard linking from the executable file snap-confine to any binary file because the snap service is not correctly checking where that file started from . The same effect was due to the alleged race condition snap-confine Possible if attackers truncated their content in it while preparing a private mount namespace . Another low-severity vulnerability was that older versions of Snap did not set permissions on the ~/snap directory restrictively enough so that unauthorized people could read the information . at Qualys . Security Consultant describesan IT security company Snap provides an environment with runtime libraries and class layers so that these software packages do not damage the system. Multiple weaknesses Attackers can use the content interface designed and layout ads in Snap packages to introduce arbitrary AppArmor rules and thus break Snap Rights restrictions 8.2risk high). Also