CVE-2022-3328 _ Snapd Race condition in snap-confine
🚥

CVE-2022-3328 _ Snapd Race condition in snap-confine

⚠️ [ ORIGIN SOURCE ]
https://blog.qualys.com/vulnerabilities-threat-research/2022/11/30/race-condition-in-snap-confines-must_mkdir_and_open_with_perms-cve-2022-3328
📅 [ Archival Date ]
Dec 9, 2022 1:43 PM
🏷️ [ Tags ]
SnapdUbuntu
✍️ [ Author ]

Saeed Abbasi

The Qualys Threat Research Unit (TRU) has discovered a new vulnerability in snap-confine function on Linux operating systems, a SUID-root program installed by default on Ubuntu. Qualys recommends that security teams apply the patch for this vulnerability as soon as possible.

In February 2022, Qualys Threat Research Unit (TRU) published CVE-2021-44731 in our “Lemmings” advisory. The vulnerability (CVE-2022-3328) was introduced in February 2022 by the patch for CVE-2021-44731)

The Qualys Threat Research Unit (TRU) exploited this bug in Ubuntu Server by combining it with two vulnerabilities in multipathd called Leeloo Multipath (an authorization bypass and a symlink attack, CVE-2022-41974 and CVE-2022-41973), to obtain full root privileges.

What is snap-confine?

The snap-confine program is used internally by snapd to construct the execution environment for snap applications, an internal tool for confining snappy applications.

Read more

Potential Impact

Successful exploitation of the three vulnerabilities lets any unprivileged user gain root privileges on the vulnerable device. Qualys security researchers have verified the vulnerability, developed an exploit and obtained full root privileges on default installations of Ubuntu.

As soon as the Qualys Threat Research Unit confirmed the vulnerability, we engaged in responsible vulnerability disclosure and coordinated with vendors and open-source distributions to announce this newly discovered vulnerability.

The technical details

Disclosure Timeline

  • 2022-08-23: Contacted security@ubuntu
  • 2022-11-28: Contacted linux-distros@openwall
  • 2022-11-30: Coordinated Release Date (17:00 UTC)