Debian Package Tracker
Register | Log in
Subscribe

snapd

Daemon and tooling that enable snap packages

Choose email to subscribe with

general
  • source: snapd (main)
  • version: 2.71-3
  • maintainer: Michael Hudson-Doyle (DMD)
  • uploaders: Michael Vogt [DMD] – Zygmunt Krynicki [DMD] [DM]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.49-1+deb11u2
  • o-o-sec: 2.49-1+deb11u2
  • oldstable: 2.57.6-1
  • stable: 2.68.3-3
  • testing: 2.68.3-3
  • unstable: 2.71-3
versioned links
  • 2.49-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.57.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.68.3-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.71-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-snapcore-snapd-dev
  • snapd (22 bugs: 1, 20, 1, 0)
action needed
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2025-08-27 Last update: 2025-09-08 19:32
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-05-30 Last update: 2025-09-08 19:31
debian/patches: 10 patches to forward upstream low

Among the 10 debian patches available in version 2.71-3 of the package, we noticed the following issues:

  • 10 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-08-22 12:02
5 low-priority security issues in bookworm low

There are 5 open security issues in bookworm.

5 issues left for the package maintainer to handle:
  • CVE-2023-1523: (needs triaging) Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
  • CVE-2024-1724: (needs triaging) In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.
  • CVE-2024-5138: (needs triaging) The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
  • CVE-2024-29068: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image and so can contain files that are non-regular files (such as pipes or sockets etc). Various file entries within the snap squashfs image (such as icons etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service.
  • CVE-2024-29069: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow an unprivileged user to gain access to privileged information.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-08-22 05:31
testing migrations
  • excuses:
    • Migrates after: golang-1.24
    • Migration status for snapd (2.68.3-3 to 2.71-3): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating snapd would introduce bugs in testing: #1101956
    • ∙ ∙ Built-Using: snapd golang-1.24 (not considered)
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/s/snapd.html
    • ∙ ∙ autopkgtest for snapd/2.71-3: amd64: Pass, arm64: No tests, superficial or marked flaky ♻ (reference ♻), i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: No tests, superficial or marked flaky ♻ (reference ♻), riscv64: No tests, superficial or marked flaky ♻ (reference ♻), s390x: No tests, superficial or marked flaky ♻ (reference ♻)
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ 18 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2025-08-21] Accepted snapd 2.71-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-08-21] Accepted snapd 2.71-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-08-21] Accepted snapd 2.71-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-07-20] snapd 2.68.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-07-15] Accepted snapd 2.68.3-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-03-31] snapd 2.68.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-25] Accepted snapd 2.68.3-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-02-02] snapd 2.67-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-28] Accepted snapd 2.67-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-01-27] snapd 2.66.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-18] Accepted snapd 2.66.1-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-11-28] Accepted snapd 2.66.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-24] snapd 2.65.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-19] Accepted snapd 2.65.3-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-11] snapd 2.65.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-06] Accepted snapd 2.65.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-19] Accepted snapd 2.63-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-17] Accepted snapd 2.63-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-12] snapd 2.62-5 MIGRATED to testing (Debian testing watch)
  • [2024-06-06] Accepted snapd 2.62-5 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-04] Accepted snapd 2.62-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-03] Accepted snapd 2.62-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-02] snapd 2.62-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-28] Accepted snapd 2.62-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-04-22] snapd 2.62-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-17] Accepted snapd 2.62-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • 1
  • 2
bugs [bug history graph]
  • all: 33
  • RC: 1
  • I&N: 28
  • M&W: 4
  • F&P: 0
  • patch: 1
  • NC: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 26)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.71+ubuntu25.10
  • 486 bugs (6 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing