Debian Package Tracker
Register | Log in
Subscribe

snapd

Daemon and tooling that enable snap packages

Choose email to subscribe with

general
  • source: snapd (main)
  • version: 2.54.3-1
  • maintainer: Michael Hudson-Doyle (DMD)
  • uploaders: Michael Vogt [DMD] – Luke Faraone [DMD] – Steve Langasek [DMD] – Zygmunt Krynicki [DMD] [DM]
  • arch: all any
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.21-2
  • o-o-sec: 2.21-2+deb9u1
  • oldstable: 2.37.4-1
  • old-sec: 2.37.4-1+deb10u1
  • stable: 2.49-1
  • stable-sec: 2.49-1+deb11u1
  • testing: 2.54.3-1
  • unstable: 2.54.3-1
versioned links
  • 2.21-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.21-2+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.37.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.37.4-1+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.49-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.49-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.54.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-snapcore-snapd-dev
  • snap-confine (1 bugs: 0, 0, 1, 0)
  • snapd (17 bugs: 0, 17, 0, 0)
  • ubuntu-core-launcher
action needed
A new upstream version is available: 2.55.5 high
A new upstream version 2.55.5 is available, you should consider packaging it.
Created: 2022-03-07 Last update: 2022-05-21 22:08
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2019-02-19 Last update: 2022-05-18 19:06
8 security issues in stretch high

There are 8 open security issues in stretch.

4 important issues:
  • CVE-2021-3155: snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
  • CVE-2021-4120: snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
  • CVE-2021-44730: snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
  • CVE-2021-44731: A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
4 issues postponed or untriaged:
  • CVE-2019-7303: (needs triaging) A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.
  • CVE-2019-11502: (needs triaging) snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
  • CVE-2019-11503: (needs triaging) snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
  • CVE-2020-27352: (needs triaging)
Created: 2022-02-17 Last update: 2022-03-26 17:38
lintian reports 1 error and 10 warnings high
Lintian reports 1 error and 10 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-10-13 Last update: 2022-01-01 04:35
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2018-07-29 Last update: 2022-05-21 22:31
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • golang-github-snapcore-snapd-dev could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2022-05-21 22:08
6 low-priority security issues in buster low

There are 6 open security issues in buster.

5 issues left for the package maintainer to handle:
  • CVE-2021-3155: (needs triaging) snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
  • CVE-2019-11502: (needs triaging) snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
  • CVE-2019-11503: (needs triaging) snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
  • CVE-2020-11934: (needs triaging) It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.
  • CVE-2020-27352: (needs triaging)

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2021-4120: snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Created: 2021-02-19 Last update: 2022-03-26 17:38
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-3155: (needs triaging) snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1

You can find information about how to handle this issue in the security team's documentation.

Created: 2022-02-17 Last update: 2022-03-26 17:38
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2022-02-25] snapd 2.54.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-23] Accepted snapd 2.54.3-1 (source) into unstable (Michael Vogt)
  • [2022-02-19] Accepted snapd 2.49-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Michael Vogt)
  • [2022-02-18] Accepted snapd 2.49-1+deb11u1 (source) into stable-security->embargoed, stable-security (Debian FTP Masters) (signed by: Michael Vogt)
  • [2022-02-18] Accepted snapd 2.37.4-1+deb10u1 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Michael Vogt)
  • [2022-02-17] snapd 2.54.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-20] Accepted snapd 2.54.1-1 (source) into unstable (Michael Vogt)
  • [2021-09-22] snapd 2.51.7-2 MIGRATED to testing (Debian testing watch)
  • [2021-09-07] Accepted snapd 2.51.7-2 (source) into unstable (Michael Vogt)
  • [2021-09-06] snapd 2.51.7-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-01] Accepted snapd 2.51.7-1 (source) into unstable (Michael Vogt)
  • [2021-03-06] snapd 2.49-1 MIGRATED to testing (Debian testing watch)
  • [2021-02-24] Accepted snapd 2.49-1 (source) into unstable (Michael Vogt)
  • [2021-01-27] snapd 2.48.2-3 MIGRATED to testing (Debian testing watch)
  • [2021-01-22] Accepted snapd 2.48.2-3 (source) into unstable (Michael Vogt)
  • [2021-01-15] Accepted snapd 2.21-2+deb9u1 (source all amd64) into oldstable (Brian May)
  • [2021-01-15] Accepted snapd 2.48.2-2 (source) into unstable (Michael Vogt)
  • [2021-01-15] Accepted snapd 2.48.2-1 (source) into unstable (Michael Vogt)
  • [2020-07-18] snapd 2.45.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-15] Accepted snapd 2.45.2-1 (source) into unstable (Michael Vogt)
  • [2020-04-11] snapd 2.44.1-2 MIGRATED to testing (Debian testing watch)
  • [2020-04-06] Accepted snapd 2.44.1-2 (source) into unstable (Michael Vogt)
  • [2020-03-24] Accepted snapd 2.44.1-1 (source) into unstable (Michael Vogt)
  • [2019-11-11] snapd 2.42.1-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-06] Accepted snapd 2.42.1-1 (source) into unstable (Michael Vogt)
  • [2019-07-24] Accepted snapd 2.40-1 (source all amd64) into unstable (Michael Vogt)
  • [2019-03-11] snapd 2.37.4-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-28] Accepted snapd 2.37.4-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2019-02-19] Accepted snapd 2.37.3-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2019-02-12] snapd 2.37.2-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 24
  • RC: 2
  • I&N: 20
  • M&W: 2
  • F&P: 0
  • patch: 0
  • NC: 1
links
  • homepage
  • lintian (1, 10)
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 26)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.55.3+22.04ubuntu1
  • 305 bugs (3 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing