Debian Package Tracker
Register | Log in
Subscribe

snapd

Daemon and tooling that enable snap packages

Choose email to subscribe with

general
  • source: snapd (main)
  • version: 2.72-1
  • maintainer: Michael Hudson-Doyle (DMD)
  • uploaders: Michael Vogt [DMD] – Zygmunt Krynicki [DMD] [DM]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.49-1+deb11u2
  • o-o-sec: 2.49-1+deb11u2
  • oldstable: 2.57.6-1
  • stable: 2.68.3-3
  • testing: 2.71-3
  • unstable: 2.72-1
versioned links
  • 2.49-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.57.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.68.3-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.71-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.72-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-snapcore-snapd-dev
  • snapd (24 bugs: 0, 21, 3, 0)
action needed
A new upstream version is available: 2.73 high
A new upstream version 2.73 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-02-02 19:33
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2026-01-26 Last update: 2026-01-26 16:00
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2026-01-31 Last update: 2026-02-02 21:01
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-05-30 Last update: 2026-02-02 21:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-10-15 Last update: 2026-02-02 19:00
debian/patches: 5 patches to forward upstream low

Among the 6 debian patches available in version 2.72-1 of the package, we noticed the following issues:

  • 5 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-01-26 23:01
5 low-priority security issues in bookworm low

There are 5 open security issues in bookworm.

5 issues left for the package maintainer to handle:
  • CVE-2023-1523: (needs triaging) Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
  • CVE-2024-1724: (needs triaging) In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.
  • CVE-2024-5138: (needs triaging) The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
  • CVE-2024-29068: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image and so can contain files that are non-regular files (such as pipes or sockets etc). Various file entries within the snap squashfs image (such as icons etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service.
  • CVE-2024-29069: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow an unprivileged user to gain access to privileged information.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2026-01-26 15:16
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-01-26 16:00
testing migrations
  • excuses:
    • Migrates after: golang-1.24
    • Migration status for snapd (2.71-3 to 2.72-1): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • ∙ ∙ Missing build on arm64
    • ∙ ∙ Missing build on armhf
    • ∙ ∙ Missing build on i386
    • ∙ ∙ Missing build on ppc64el
    • ∙ ∙ Missing build on riscv64
    • ∙ ∙ Missing build on s390x
    • ∙ ∙ Autopkgtest deferred on arm64: missing arch:arm64 build
    • ∙ ∙ Autopkgtest deferred on i386: missing arch:i386 build
    • ∙ ∙ Autopkgtest deferred on ppc64el: missing arch:ppc64el build
    • ∙ ∙ Autopkgtest deferred on riscv64: missing arch:riscv64 build
    • ∙ ∙ Autopkgtest deferred on s390x: missing arch:s390x build
    • ∙ ∙ Autopkgtest for snapd/2.72-1: amd64: Pass
    • ∙ ∙ Lintian check waiting for test results on armhf, ppc64el, riscv64, s390x, arm64, i386 - info
    • ∙ ∙ Reproducibility check deferred on arm64: missing builds
    • ∙ ∙ Reproducibility check deferred on armhf: missing builds
    • ∙ ∙ Reproducibility check deferred on i386: missing builds
    • ∙ ∙ Reproducibility check deferred on ppc64el: missing builds
    • ∙ ∙ Built-Using: snapd golang-1.24 (not considered)
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/s/snapd.html
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ 8 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2026-01-26] Accepted snapd 2.72-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-10-14] snapd 2.71-3 MIGRATED to testing (Debian testing watch)
  • [2025-08-21] Accepted snapd 2.71-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-08-21] Accepted snapd 2.71-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-08-21] Accepted snapd 2.71-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-07-20] snapd 2.68.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-07-15] Accepted snapd 2.68.3-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-03-31] snapd 2.68.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-25] Accepted snapd 2.68.3-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-02-02] snapd 2.67-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-28] Accepted snapd 2.67-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-01-27] snapd 2.66.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-18] Accepted snapd 2.66.1-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-11-28] Accepted snapd 2.66.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-24] snapd 2.65.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-19] Accepted snapd 2.65.3-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-11] snapd 2.65.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-06] Accepted snapd 2.65.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-19] Accepted snapd 2.63-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-17] Accepted snapd 2.63-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-12] snapd 2.62-5 MIGRATED to testing (Debian testing watch)
  • [2024-06-06] Accepted snapd 2.62-5 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-04] Accepted snapd 2.62-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-03] Accepted snapd 2.62-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-02] snapd 2.62-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-28] Accepted snapd 2.62-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • 1
  • 2
bugs [bug history graph]
  • all: 37
  • RC: 1
  • I&N: 30
  • M&W: 6
  • F&P: 0
  • patch: 1
  • NC: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 26)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.74+ubuntu26.04
  • 496 bugs (6 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing