UbuntuUpdates.org

Package "ubuntu-snappy"

Name: ubuntu-snappy

Description:

transitional dummy package

Latest version: 2.63+22.04ubuntu0.1
Release: jammy (22.04)
Level: security
Repository: universe
Head package: snapd
Homepage: https://github.com/snapcore/snapd

Links


Download "ubuntu-snappy"


Other versions of "ubuntu-snappy" in Jammy

Repository Area Version
base universe 2.55.3+22.04
updates universe 2.66.1+22.04

Changelog

Version: 2.63+22.04ubuntu0.1 2024-08-01 07:07:21 UTC

  snapd (2.63+22.04ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: sandbox escape via $HOME/bin
    - interfaces/builtin/home: explicitly deny writing to @{HOME}/bin
    - CVE-2024-1724
  * SECURITY UPDATE: denial-of-service via crafted files in squashfs image
    - snap, snapdir, squashfs: improve validation of target file
      mode/types
    - CVE-2024-29068
  * SECURITY UPDATE: information disclosure via crafted symlinks in
    squashfs image
    - snap, snapdir, squashfs: improve external symlink validation
    - CVE-2024-29069
  * Fix FTBFS due to missing systemd from Build-Depends
    - debian/control: add systemd to Build-Depends to ensure pkg-config
      can find the systemdutildir to install into

 -- Alex Murray <email address hidden> Fri, 26 Jul 2024 12:27:32 +0930

Source diff to previous version
CVE-2024-1724 In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path.
CVE-2024-29068 In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image
CVE-2024-29069 In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squas

Version: 2.58+22.04.1 2023-05-31 03:07:14 UTC

  snapd (2.58+22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: possible sandbox escape via TIOCLINUX ioctl
    - interfaces/seccomp/template.go: block ioctl with TIOCLINUX. Patch
      from upstream. Graphical terminal emulators like xterm, gnome-terminal
      and others are not affected - this can only be exploited when snaps
      are run on a virtual console.
    - https://github.com/snapcore/snapd/pull/12849
    - CVE-2023-1523

 -- Alex Murray <email address hidden> Mon, 29 May 2023 21:38:22 +0930

Source diff to previous version

Version: 2.57.5+22.04ubuntu0.1 2022-12-01 04:06:32 UTC

  snapd (2.57.5+22.04ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Local privilege escalation
    - snap-confine: Fix race condition in snap-confine when preparing a
      private tmp mount namespace for a snap
    - CVE-2022-3328

 -- Alex Murray <email address hidden> Mon, 28 Nov 2022 15:23:24 +1030




About   -   Send Feedback to @ubuntu_updates