Comment 36 for bug 1813365

Revision history for this message
Chris Moberly (chris.moberly) wrote :

Hi Gustavo,

Yes, but remember that this is a low-privilege user exploiting the bug in order to install a snap in devmode to get root.

This does indeed require an exploit, so that the install hook can execute the commands as root and add a new user. It's simply an alternative exploit to using the create-user API.

You can see the code at github.com/initstring/dirty_sock/ in the version 2.

Some of the tech journalists covering this incorrectly claimed that my exploit would be bundled inside malicious snaps. This is where there is a bit of confusion, as you're 100% right - that snap would not have access to the socket, so that is not realistic. I've tried to correct folks where I can, but I think my blog posting is still correctly describing things.

If you see something specific in the blog posting that should be corrected, please let me know.

Thanks!