UbuntuUpdates.org

Package "snapd"

Name: snapd

Description:

Daemon and tooling that enable snap packages

Latest version: 2.63+20.04ubuntu0.1
Release: focal (20.04)
Level: security
Repository: main
Homepage: https://github.com/snapcore/snapd

Links


Download "snapd"


Other versions of "snapd" in Focal

Repository Area Version
base universe 2.44.3+20.04
base main 2.44.3+20.04
security universe 2.63+20.04ubuntu0.1
updates universe 2.65.3+20.04
updates main 2.65.3+20.04
proposed universe 2.66.1+20.04
proposed main 2.66.1+20.04

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.54.3+20.04.1 2022-02-18 03:07:18 UTC

  snapd (2.54.3+20.04.1) focal-security; urgency=medium

  * debian/rules: disabling unit tests on riscv64

 -- Emilia Torino <email address hidden> Thu, 17 Feb 2022 15:37:53 -0300

Source diff to previous version

Version: 2.54.3+20.04 2022-02-17 18:09:51 UTC

  snapd (2.54.3+20.04) focal-security; urgency=medium

  * SECURITY UPDATE: Sensitive information exposure
    - usersession/autostart: change ~/snap perms to 0700 on startup.
    - cmd: create ~/snap dir with 0700 perms.
    - CVE-2021-3155
    - LP: #1910298
  * SECURITY UPDATE: Local privilege escalation
    - snap-confine: Add validations of the location of the snap-confine
      binary within snapd.
    - snap-confine: Fix race condition in snap-confine when preparing a
      private mount namespace for a snap.
    - CVE-2021-44730
    - CVE-2021-44731
  * SECURITY UPDATE: Data injection from malicious snaps
    - interfaces: Add validations of snap content interface and layout
      paths in snapd.
    - CVE-2021-4120
    - LP: #1949368

 -- Michael Vogt <email address hidden> Tue, 15 Feb 2022 17:45:13 +0100

Source diff to previous version
1910298 ~/snap directory should be o0700
CVE-2021-3155 RESERVED
CVE-2021-44730 RESERVED
CVE-2021-44731 RESERVED
CVE-2021-4120 RESERVED

Version: 2.48.3+20.04 2021-02-10 01:07:16 UTC

  snapd (2.48.3+20.04) focal-security; urgency=medium

  * SECURITY UPDATE: sandbox escape vulnerability for containers
    (LP: #1910456)
    - many: add Delegate=true to generated systemd units for special
      interfaces
    - interfaces/greengrass-support: back-port interface changes to
      2.48
    - CVE-2020-27352
  * interfaces/builtin/docker-support: allow /run/containerd/s/...
    - This is a new path that docker 19.03.14 (with a new version of
      containerd) uses to avoid containerd CVE issues around the unix
      socket. See also CVE-2020-15257.

Source diff to previous version
CVE-2020-27352 RESERVED
CVE-2020-15257 containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.

Version: 2.45.1+20.04.2 2020-07-15 15:06:33 UTC

  snapd (2.45.1+20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: sandbox escape vulnerability via snapctl user-open
    (xdg-open)
    - usersession/userd/launcher.go: remove XDG_DATA_DIRS environment
      variable modification when calling the system xdg-open. Patch
      thanks to James Henstridge
    - packaging/ubuntu-16.04/snapd.postinst: kill userd on upgrade so it
      may autostart on next use. Patch thanks to Michael Vogt
    - CVE-2020-11934
    - LP: #1880085

 -- Emilia Torino <email address hidden> Fri, 10 Jul 2020 10:59:20 -0300




About   -   Send Feedback to @ubuntu_updates