[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-14 Thread Gustavo Niemeyer
Thanks for the clarification, Chris. We're in complete agreement. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1813365 Title: Local privilege escalation via snapd socket To manage notifications ab

[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-14 Thread Chris Moberly
^ Sorry, just to add clarity: I am not demonstrating the exploit working from within a devmode snap. I am demonstrating a devmode snap packaged inside the exploit. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad

[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-14 Thread Chris Moberly
Hi Gustavo, Yes, but remember that this is a low-privilege user exploiting the bug in order to install a snap in devmode to get root. This does indeed require an exploit, so that the install hook can execute the commands as root and add a new user. It's simply an alternative exploit to using the

[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-14 Thread Gustavo Niemeyer
Chris, I've just read your blog post at: https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html There you install a snap in devmode, which does a bunch of things to demonstrate that the snap can access system resources via the vulnerability in <2.37. Just for the record, it's slightly undue to cla

[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-12 Thread Chris Moberly
Thanks again to everyone for your hard work, timely updates, and overall providing such a great disclosure experience. See you next time! - Chris -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/181336

[Bug 1813365] Re: Local privilege escalation via snapd socket

2019-02-12 Thread Jamie Strandboge
This is now public: - https://usn.ubuntu.com/3887-1/ - https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SnapSocketParsing ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to U