UbuntuUpdates.org

Package "ubuntu-snappy"

Name: ubuntu-snappy

Description:

transitional dummy package

Latest version: 2.58+18.04.1
Release: bionic (18.04)
Level: updates
Repository: universe
Head package: snapd
Homepage: https://github.com/snapcore/snapd

Links


Download "ubuntu-snappy"


Other versions of "ubuntu-snappy" in Bionic

Repository Area Version
base universe 2.32.5+18.04
security universe 2.58+18.04.1

Changelog

Version: 2.54.3+18.04.2ubuntu0.2 2022-02-24 01:06:20 UTC

  snapd (2.54.3+18.04.2ubuntu0.2) bionic-security; urgency=medium

  * SECURITY REGRESSION: Fix fish shell compatibility
    - data/env/snapd.fish.in: more workarounds for even older fish shells,
      provide reasonable defaults.
    - LP: #1961791

 -- Paulo Flabiano Smorigo <email address hidden> Wed, 23 Feb 2022 18:29:05 +0000

Source diff to previous version
1961791 2.54.3+21.10.1ubuntu0.1 broke Plasma Desktop when Fish is the default shell

Version: 2.54.3+18.04.2ubuntu0.1 2022-02-19 02:06:25 UTC

  snapd (2.54.3+18.04.2ubuntu0.1) bionic-security; urgency=medium

  * SECURITY REGRESSION: Fix fish shell compatibility
    - data/env/snapd.fish.in: fix fish env for all versions of fish, unexport
      local vars, export XDG_DATA_DIRS.
    - LP: #1961365

 -- Paulo Flabiano Smorigo <email address hidden> Fri, 18 Feb 2022 14:06:51 +0000

Source diff to previous version
1961365 2.54.3+18.04 update on bionic breaks fish shell

Version: 2.54.3+18.04 2022-02-17 19:07:27 UTC

  snapd (2.54.3+18.04) bionic-security; urgency=medium

  * SECURITY UPDATE: Sensitive information exposure
    - usersession/autostart: change ~/snap perms to 0700 on startup.
    - cmd: create ~/snap dir with 0700 perms.
    - CVE-2021-3155
    - LP: #1910298
  * SECURITY UPDATE: Local privilege escalation
    - snap-confine: Add validations of the location of the snap-confine
      binary within snapd.
    - snap-confine: Fix race condition in snap-confine when preparing a
      private mount namespace for a snap.
    - CVE-2021-44730
    - CVE-2021-44731
  * SECURITY UPDATE: Data injection from malicious snaps
    - interfaces: Add validations of snap content interface and layout
      paths in snapd.
    - CVE-2021-4120
    - LP: #1949368

 -- Michael Vogt <email address hidden> Tue, 15 Feb 2022 17:45:13 +0100

Source diff to previous version
1910298 ~/snap directory should be o0700
CVE-2021-3155 RESERVED
CVE-2021-44730 RESERVED
CVE-2021-44731 RESERVED
CVE-2021-4120 RESERVED

Version: 2.54.2+18.04ubuntu1 2022-02-09 10:07:16 UTC

  snapd (2.54.2+18.04ubuntu1) bionic; urgency=medium

  * New upstream release, LP: #1955137
    - fix missing prepare in autopkgtest setup, this fixes the
      autopkgest failure from the previous upload

 -- Michael Vogt <email address hidden> Fri, 14 Jan 2022 17:23:34 +0100

Source diff to previous version
1955137 [SRU] 2.54

Version: 2.51.1+18.04 2021-09-22 09:06:20 UTC

  snapd (2.51.1+18.04) bionic; urgency=medium

  * New upstream release, LP: #1929842
    - interfaces: add netlink-driver interface
    - interfaces: builtin: add dm-crypt interface to support external
      storage encryption
    - interfaces/dsp: fix typo in udev rule
    - overlord/snapstate: lock the mutex before returning from stop
      snap services undo
    - interfaces: opengl: change path for Xilinx zocl driver
    - interfaces/dsp: add /dev/cavalry into dsp interface
    - packaging/fedora/snapd.spec: correct date format in changelog

 -- Michael Vogt <email address hidden> Tue, 15 Jun 2021 12:45:08 +0200

1929842 [SRU] 2.51



About   -   Send Feedback to @ubuntu_updates