-----BEGIN PGP SIGNATURE-----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=aKY8
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6940-2
January 13, 2025
snapd vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in snapd.
Software Description:
- snapd: Daemon and tooling that enable snap packages
Details:
USN-6940-1 fixed vulnerabilities in snapd. This update provides the
corresponding updates for Ubuntu 18.04 LTS and Ubuntu 16.04 LTS.
Original advisory details:
Neil McPhail discovered that snapd did not properly restrict writes to
the /home/jslarraz/bin path in the AppArmor profile for snaps using the home
plug. An attacker who could convince a user to install a malicious snap
could use this vulnerability to escape the snap sandbox. (CVE-2024-1724)
Zeyad Gouda discovered that snapd failed to properly check the file type
when extracting a snap. An attacker who could convince a user to install
a malicious snap containing non-regular files could then cause snapd to
block indefinitely while trying to read from such files and cause a
denial of service. (CVE-2024-29068)
Zeyad Gouda discovered that snapd failed to properly check the
destination of symbolic links when extracting a snap. An attacker who
could convince a user to install a malicious snap containing crafted
symbolic links could then cause snapd to write out the contents of the
symbolic link destination into a world-readable directory. This in-turn
could allow a local unprivileged user to gain access to privileged
information. (CVE-2024-29069)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
snapd 2.61.4ubuntu0.18.04.1+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
snapd 2.61.4ubuntu0.16.04.1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6940-2
https://ubuntu.com/security/notices/USN-6940-1
CVE-2024-1724, CVE-2024-29068, CVE-2024-29069
No comments:
Post a Comment