Navigation
Recherche
|
Dirty_Sock vulnerability in Canonical's snapd could give root access on Linux machines
mercredi 13 février 2019, 14:56 , par BetaNews
A security researcher has discovered a vulnerability in Canonical's snapd package which could be exploited to gain administrator privileges and root access to affected Linux systems. The security issue has been dubbed Dirty_Sock and assigned the code CVE-2019-7304. Chris Moberly found a privilege escalation vulnerability in the snapd API. This is installed by default in Ubuntu -- under which proofs of concept have been tested and found to work '100% of the time on fresh, default installations of Ubuntu Server and Desktop' -- but may also be present in numerous other Linux distros. The Ubuntu CVE Tracker describes the vulnerability… [Continue Reading]
https://betanews.com/2019/02/13/dirty-sock-snapd-linux/
|
56 sources (32 en français)
Date Actuelle
ven. 22 nov. - 19:23 CET
|