Linux snapd dirty_sock Local Privilege Escalation Exploit Update

This module exploits a vulnerability in snapd which incorrectly validates and parses the remote socket address when performing access controls on its UNIX socket.

A local attacker could use this to access privileged socket APIs and obtain administrator privileges.



This update adds support for more platforms.
Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name