8 comments

  • capitainenemo 8 minutes ago

    It is possible to just not use snap on ubuntu. The few ubuntu servers we have, even the couple with a minimal XFCE interface for some gui pieces, don't have snap installed. I realise local exploits happen all the time, but why add a whole new huge surface area if I don't have to.

  • ptx 2 hours ago

    Better to follow the link to the technical details and just read those: https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-sys...

    The article linked in the submission is more verbose but less clear and half of it is an advertisement for their product.

  • ifh-hn 2 hours ago

    I wonder if, and this is just speculating not trying to start an arguement, if this sort of thing could have happened in the simpler pre-snap, pre-systemd systems? More to the point is this a cause of using more complicated software?

    • dogleash 2 hours ago

      Permission and timing gotchas in /tmp predate snap and systemd. It's why things like `mkstemp` exist.

      I remember cron jobs that did what systemd-tmpfiles-clean does before it existed. All unix daemons using /tmp run the risk of misusing /tmp. I don't know snap well enough to say anything about it makes it uniquely more susceptible to that.

      • SoftTalker an hour ago

        The mistake seems to be using a predictable path (/tmp/.snap) in a publicly-writable directory.

        • pbhjpbhj 5 minutes ago

          The exploit doesn't rely on the path being predictable though.

          As I read it the .snap is expired and pruned, then the exploiter makes their own .snap in /tmp, then snap-confine assumes that the new .snap is the old one and executes with elevated privileges.

          So, the path can be from mkstemp, or a sha-256 of your significant others fingerprint, it doesn't matter; until it expires it's plaintext in the /tmp listing.

          {Wild, ignorant speculation follows ... hashing the inode and putting a signed file in the folder bearing that hash, then checking for that ... something that works but along those lines might be appropriate. (We know the inode for the 10 days we're waiting for /tmp/.snap to get pruned; time that might be used to generate a hash collision, so my off-the-cuff suggestion is definitely no good. It feels like there's a simple solution but everything I can think of fails to KPA, I think -- perhaps just use dm-crypt for the /tmp/.snap folder?}

  • rglover 33 minutes ago

    Semi-related: does anybody know of a reliable API that announces CVEs as they're published?

    Edit: for others who may be curious https://www.cve.org/Downloads

  • charcircuit 14 minutes ago

    When will these distros accept suid was a mistake and disable it. It has lead to critical local privilege escalation exploits so many times.