Lucene search

K
hiveproHive ProHIVEPRO:F7B79932B279BCFB8B81192C532BC849
HistoryFeb 21, 2022 - 4:34 a.m.

Privilege Escalation Vulnerability in Snap Package Manager puts Linux users at risk

2022-02-2104:34:58
Hive Pro
www.hivepro.com
26
linux
package manager
privilege escalation
vulnerability
snap
cve-2021-44731

EPSS

0.001

Percentile

17.3%

THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here A privilege escalation vulnerability has been identified in Canonical Snap software package manager that affects the Linux-based operating systems. Successful exploitation of this issue might allow an attacker to escalate privileges and gain root access to the affected system. The issue being tracked as CVE-2021-44731 exists due to a race condition in the 'snap-confine' function, a program used internally by snapd to construct the execution environment for snap applications. A local attacker can use this flaw to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing 'snap-confine' function to run arbitrary code. To address this vulnerability, organizations should upgrade their snap (package manager) to versions 2.54.3+18.04, 2.54.3+20.04, and 2.54.3+21.10.1. Potential MITRE ATT&CK TTPs are: TA0004: Privilege Escalation T1068- Exploitation for Privilege Escalation Vulnerability Detail Patch Link https://ubuntu.com/security/notices/USN-5292-1 References https://blog.qualys.com/vulnerabilities-threat-research/2022/02/17/oh-snap-more-lemmings-local-privilege-escalation-vulnerability-discovered-in-snap-confine-cve-2021-44731