Expert discovered a privilege escalation vulnerability in default installations of Ubuntu Linux that resides in the snapd API. Security researcher Chris Moberly discovered a vulnerability in the REST API for Canonicals snapd daemon that could allow attackers to gain root access on Linux machines. The flaw called Dirty_Sock would affect affects several Linux servers, the expert successfully tested on Ubuntu and released PoCs to show how to elevate privileges. Canonical has already addressed the flaw, administrators need to update snapd to avoid the exploitation.”]
Source: https://securityaffairs.co/wordpress/81059/hacking/snapd-privilege-escalation.html

