Описание
Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | pending | 2.74.1+ubuntu26.04.1 |
| esm-infra/bionic | released | 2.61.4ubuntu0.18.04.1+esm2 |
| esm-infra/focal | released | 2.67.1+20.04ubuntu1~esm1 |
| esm-infra/xenial | released | 2.61.4ubuntu0.16.04.1+esm2 |
| jammy | released | 2.73+ubuntu22.04.1 |
| noble | released | 2.73+ubuntu24.04.2 |
| questing | released | 2.73+ubuntu25.10.1 |
| snap | pending | 2.75.1 |
| upstream | pending | 2.75.1 |
Показывать по
Ссылки на источники
EPSS
7.8 High
CVSS3
Связанные уязвимости
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Local privilege escalation in snapd on Linux allows local attackers to ...
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root
EPSS
7.8 High
CVSS3