A local privilege-escalation vulnerability in Canonical s snapd package has been uncovered. It would allow any user to obtain administrator privileges and immediate root access to affected Linux system servers. The issue affects default installations of Ubuntu Server and Desktop and is likely included in many Ubuntu-like Linux distributions. The vulnerability resides in the snapd API, installed by default in Ubuntu, which is used by Linux users to download and install apps in the.snap file format. A researcher dubbed the issue Dirty Sock since it revolves around handling sockets.
Source: https://threatpost.com/dirty-sock-snapd-linux/141779/

