Daffodil International University
Faculty of Science and Information Technology => Recent Technologies and Trends in Software Engineering => Software Engineering => Cyber and Software Security => Topic started by: maruf.swe on March 29, 2019, 01:10:55 AM
-
(https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/13101914/shutterstock_72375778-1.jpg)
The issue affects default installations of Ubuntu Server and Desktop and is likely included in many Ubuntu-like Linux distributions.
A local privilege-escalation vulnerability in Canonical’s snapd package has been uncovered, which would allow any user to obtain administrator privileges and immediate root access to affected Linux system servers.
For More Details : https://threatpost.com/dirty-sock-snapd-linux/141779/ (https://threatpost.com/dirty-sock-snapd-linux/141779/)