==========================================================================
Ubuntu Security Notice USN-6940-2
January 13, 2025

snapd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in snapd.

Software Description:
- snapd: Daemon and tooling that enable snap packages

Details:

USN-6940-1 fixed vulnerabilities in snapd. This update provides the
corresponding updates for Ubuntu 18.04 LTS and Ubuntu 16.04 LTS.

Original advisory details:

 Neil McPhail discovered that snapd did not properly restrict writes to
 the /home/jslarraz/bin path in the AppArmor profile for snaps using the home
 plug. An attacker who could convince a user to install a malicious snap
 could use this vulnerability to escape the snap sandbox. (CVE-2024-1724)

 Zeyad Gouda discovered that snapd failed to properly check the file type
 when extracting a snap. An attacker who could convince a user to install
 a malicious snap containing non-regular files could then cause snapd to
 block indefinitely while trying to read from such files and cause a
 denial of service. (CVE-2024-29068)

 Zeyad Gouda discovered that snapd failed to properly check the
 destination of symbolic links when extracting a snap. An attacker who
 could convince a user to install a malicious snap containing crafted
 symbolic links could then cause snapd to write out the contents of the
 symbolic link destination into a world-readable directory. This in-turn
 could allow a local unprivileged user to gain access to privileged
 information. (CVE-2024-29069)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  snapd                           2.61.4ubuntu0.18.04.1+esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  snapd                           2.61.4ubuntu0.16.04.1+esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6940-2
  https://ubuntu.com/security/notices/USN-6940-1
  CVE-2024-1724, CVE-2024-29068, CVE-2024-29069

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature



Reply via email to