UbuntuUpdates.org

Package "snapd"

Name: snapd

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • snappy development go packages.
  • transitional dummy package
  • Transitional package for snapd
  • Transitional package for snapd-xdg-open

Latest version: 2.63+24.04ubuntu0.1
Release: noble (24.04)
Level: security
Repository: universe

Links



Other versions of "snapd" in Noble

Repository Area Version
base universe 2.62+24.04build1
base main 2.62+24.04build1
security main 2.63+24.04ubuntu0.1
updates main 2.65.3+24.04
updates universe 2.65.3+24.04
proposed universe 2.66.1+24.04
proposed main 2.66.1+24.04

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.63+24.04ubuntu0.1 2024-08-01 07:07:22 UTC

  snapd (2.63+24.04ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: sandbox escape via $HOME/bin
    - interfaces/builtin/home: explicitly deny writing to @{HOME}/bin
    - CVE-2024-1724
  * SECURITY UPDATE: denial-of-service via crafted files in squashfs image
    - snap, snapdir, squashfs: improve validation of target file
      mode/types
    - CVE-2024-29068
  * SECURITY UPDATE: information disclosure via crafted symlinks in
    squashfs image
    - snap, snapdir, squashfs: improve external symlink validation
    - CVE-2024-29069

 -- Alex Murray <email address hidden> Fri, 26 Jul 2024 12:02:26 +0930

CVE-2024-1724 In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path.
CVE-2024-29068 In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image
CVE-2024-29069 In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squas



About   -   Send Feedback to @ubuntu_updates