UbuntuUpdates.org

Package "snapd"

Name: snapd

Description:

Daemon and tooling that enable snap packages

Latest version: 2.73+ubuntu24.04.2
Release: noble (24.04)
Level: security
Repository: main
Homepage: https://github.com/snapcore/snapd

Links


Download "snapd"


Other versions of "snapd" in Noble

Repository Area Version
base universe 2.62+24.04build1
base main 2.62+24.04build1
security universe 2.73+ubuntu24.04.2
updates universe 2.73+ubuntu24.04.2
updates main 2.73+ubuntu24.04.2

Changelog

Version: 2.73+ubuntu24.04.2 2026-03-18 07:08:03 UTC

  snapd (2.73+ubuntu24.04.2) noble-security; urgency=medium

  * SECURITY REGRESSION: typo in snapd.conf
    - data/systemd-tmpfiles/snapd.conf: Fix typo in config file.
    - CVE-2026-3888

 -- Eduardo Barretto <email address hidden> Tue, 17 Mar 2026 20:23:18 +0100

Source diff to previous version
CVE-2026-3888 Local privilege escalation in snapd on Linux allows local attackers to ...

Version: 2.73+ubuntu24.04.1 2026-03-17 19:08:00 UTC

  snapd (2.73+ubuntu24.04.1) noble-security; urgency=medium

  * SECURITY UPDATE: Local privilege escalation
    - debian/patches/CVE-2026-3888.patch: more precise prune pattern for
      tmpfiles.
    - CVE-2026-3888

 -- Eduardo Barretto <email address hidden> Thu, 12 Mar 2026 12:27:32 +0100

Source diff to previous version

Version: 2.63+24.04ubuntu0.1 2024-08-01 07:07:22 UTC

  snapd (2.63+24.04ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: sandbox escape via $HOME/bin
    - interfaces/builtin/home: explicitly deny writing to @{HOME}/bin
    - CVE-2024-1724
  * SECURITY UPDATE: denial-of-service via crafted files in squashfs image
    - snap, snapdir, squashfs: improve validation of target file
      mode/types
    - CVE-2024-29068
  * SECURITY UPDATE: information disclosure via crafted symlinks in
    squashfs image
    - snap, snapdir, squashfs: improve external symlink validation
    - CVE-2024-29069

 -- Alex Murray <email address hidden> Fri, 26 Jul 2024 12:02:26 +0930

CVE-2024-1724 In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path.
CVE-2024-29068 In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image
CVE-2024-29069 In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squas



About   -   Send Feedback to @ubuntu_updates