=========================================================================Ubuntu Security Notice USN-5753-1
December 01, 2022

snapd vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

snapd could be made to run programs as an administrator.

Software Description:
- snapd: Daemon and tooling that enable snap packages

Details:

The Qualys Research Team discovered that a race condition existed in the
snapd snap-confine binary when preparing the private /tmp mount for a
snap. A local attacker could possibly use this issue to escalate privileges
and execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  snapd                           2.57.5+22.10ubuntu0.1

Ubuntu 22.04 LTS:
  snapd                           2.57.5+22.04ubuntu0.1

Ubuntu 20.04 LTS:
  snapd                           2.57.5+20.04ubuntu0.1

Ubuntu 18.04 LTS:
  snapd                           2.57.5+18.04ubuntu0.1

Ubuntu 16.04 ESM:
  snapd                           2.54.3+16.04.0ubuntu0.1~esm5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5753-1
  CVE-2022-3328

Package Information:
  https://launchpad.net/ubuntu/+source/snapd/2.57.5+22.10ubuntu0.1
  https://launchpad.net/ubuntu/+source/snapd/2.57.5+22.04ubuntu0.1
  https://launchpad.net/ubuntu/+source/snapd/2.57.5+20.04ubuntu0.1
  https://launchpad.net/ubuntu/+source/snapd/2.57.5+18.04ubuntu0.1

Ubuntu 5753-1: snapd vulnerability

December 1, 2022
snapd could be made to run programs as an administrator.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: snapd 2.57.5+22.10ubuntu0.1 Ubuntu 22.04 LTS: snapd 2.57.5+22.04ubuntu0.1 Ubuntu 20.04 LTS: snapd 2.57.5+20.04ubuntu0.1 Ubuntu 18.04 LTS: snapd 2.57.5+18.04ubuntu0.1 Ubuntu 16.04 ESM: snapd 2.54.3+16.04.0ubuntu0.1~esm5 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5753-1

CVE-2022-3328

Severity
December 01, 2022

Package Information

https://launchpad.net/ubuntu/+source/snapd/2.57.5+22.10ubuntu0.1 https://launchpad.net/ubuntu/+source/snapd/2.57.5+22.04ubuntu0.1 https://launchpad.net/ubuntu/+source/snapd/2.57.5+20.04ubuntu0.1 https://launchpad.net/ubuntu/+source/snapd/2.57.5+18.04ubuntu0.1

Related News