[USN-3887-1] snapd vulnerability

protocol=”application/pgp-signature”; boundary=”XMCwj5IQnwKtuyBG”
Content-Disposition: inline

–XMCwj5IQnwKtuyBG

Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3887-1
February 12, 2019

snapd vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

snapd could be made to run programs as an administrator.

Software Description:
– snapd: Daemon and tooling that enable snap packages

Details:

Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly
validated and parsed the remote socket address when performing access
controls on its UNIX socket. A local attacker could use this to access
privileged socket APIs and obtain administrator privileges. On Ubuntu
systems with snaps installed, snapd typically will have already
automatically refreshed itself to snapd 2.37.1 which is unaffected.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
snapd 2.35.5+18.10.1

Ubuntu 18.04 LTS:
snapd 2.34.2+18.04.1

Ubuntu 16.04 LTS:
snapd 2.34.2ubuntu0.1

Ubuntu 14.04 LTS:
snapd 2.34.2~14.04.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3887-1
CVE-2019-7304, https://launchpad.net/bugs/1813365

Package Information:
https://launchpad.net/ubuntu/+source/snapd/2.35.5+18.10.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2+18.04.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2ubuntu0.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2~14.04.1

–XMCwj5IQnwKtuyBG

—–BEGIN PGP SIGNATURE—–
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=cWoV
—–END PGP SIGNATURE—–

–XMCwj5IQnwKtuyBG–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK