New Linux Privilege Escalation Flaw Uncovered in Snap Bundle Supervisor
2 mins read

New Linux Privilege Escalation Flaw Uncovered in Snap Bundle Supervisor


A number of safety vulnerabilities have been disclosed in Canonical’s Snap software program packaging and deployment system, probably the most vital of which will be exploited to escalate privilege to achieve root privileges.

Snaps are self-contained utility packages which can be designed to work on working techniques that use the Linux kernel and will be put in utilizing a software known as snapd.

Automatic GitHub Backups

Tracked as CVE-2021-44731, the problem issues a privilege escalation flaw within the snap-confine operate, a program used internally by snapd to assemble the execution surroundings for snap purposes. The shortcoming is rated 7.8 on the CVSS scoring system.

“Profitable exploitation of this vulnerability permits any unprivileged consumer to achieve root privileges on the susceptible host,” Bharat Jogi, director of vulnerability and menace analysis at Qualys, mentioned, including the weak point might be abused to “receive full root privileges on default installations of Ubuntu.”

Crimson Hat, in an unbiased advisory, described the problem as a “race situation” within the snap-confine part.

“A race situation in snap-confine exists when making ready a non-public mount namespace for a snap,” the corporate famous. “This might permit an area attacker to achieve root privileges by bind-mounting their very own contents contained in the snap’s personal mount namespace and inflicting snap-confine to execute arbitrary code and therefore privilege escalation.”

Prevent Data Breaches

Moreover found by the cybersecurity agency are six different flaws –

  • CVE-2021-3995 – Unauthorized unmount in util-linux’s libmount
  • CVE-2021-3996 – Unauthorized unmount in util-linux’s libmount
  • CVE-2021-3997 – Uncontrolled recursion in systemd’s systemd-tmpfiles
  • CVE-2021-3998 – Surprising return worth from glibc’s realpath()
  • CVE-2021-3999 – Off-by-one buffer overflow/underflow in glibc’s getcwd()
  • CVE-2021-44730 – Hardlink assault in snap-confine’s sc_open_snapd_tool()

The vulnerability was reported to the Ubuntu safety staff on October 27, 2021, following which patches have been launched on February 17 as a part of a coordinated disclosure course of.

Qualys additionally identified that whereas the flaw is not remotely exploitable, an attacker that has logged in as an unprivileged consumer can “rapidly” exploit the bug to achieve root permissions, necessitating that the patches are utilized as quickly as attainable to mitigate potential threats.



Leave a Reply

Your email address will not be published. Required fields are marked *