Debian Package Tracker
Register | Log in
Subscribe

snapd

Daemon and tooling that enable snap packages

Choose email to subscribe with

general
  • source: snapd (main)
  • version: 2.68.3-2
  • maintainer: Michael Hudson-Doyle (DMD)
  • uploaders: Zygmunt Krynicki [DMD] [DM] – Luke Faraone [DMD] – Michael Vogt [DMD]
  • arch: all any
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.37.4-1+deb10u1
  • o-o-sec: 2.37.4-1+deb10u3
  • oldstable: 2.49-1+deb11u2
  • old-sec: 2.49-1+deb11u2
  • stable: 2.57.6-1
  • testing: 2.68.3-2
  • unstable: 2.68.3-2
versioned links
  • 2.37.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.37.4-1+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.37.4-1+deb10u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.49-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.57.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.68.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-snapcore-snapd-dev
  • snap-confine (2 bugs: 0, 1, 1, 0)
  • snapd (21 bugs: 1, 20, 0, 0)
  • ubuntu-core-launcher (1 bugs: 0, 1, 0, 0)
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:02:34
    Last run: 2025-05-14T18:58:28.000Z
    Previous status: unknown

  • testing: fail (log)
    The tests ran in 0:01:55
    Last run: 2025-05-21T19:32:16.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:01:11
    Last run: 2025-05-13T16:26:45.000Z
    Previous status: unknown

Created: 2024-08-16 Last update: 2025-05-22 05:05
A new upstream version is available: 2.68.4 high
A new upstream version 2.68.4 is available, you should consider packaging it.
Created: 2025-05-04 Last update: 2025-05-21 23:31
lintian reports 12 warnings normal
Lintian reports 12 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:32
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • golang-github-snapcore-snapd-dev could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2025-05-22 05:03
5 low-priority security issues in bookworm low

There are 5 open security issues in bookworm.

5 issues left for the package maintainer to handle:
  • CVE-2023-1523: (needs triaging) Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
  • CVE-2024-1724: (needs triaging) In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.
  • CVE-2024-5138: (needs triaging) The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
  • CVE-2024-29068: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image and so can contain files that are non-regular files (such as pipes or sockets etc). Various file entries within the snap squashfs image (such as icons etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service.
  • CVE-2024-29069: (needs triaging) In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow an unprivileged user to gain access to privileged information.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-03-31 06:03
debian/patches: 4 patches to forward upstream low

Among the 4 debian patches available in version 2.68.3-2 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-03-26 10:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.0).
Created: 2022-05-11 Last update: 2025-03-25 23:30
news
[rss feed]
  • [2025-03-31] snapd 2.68.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-25] Accepted snapd 2.68.3-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-02-02] snapd 2.67-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-28] Accepted snapd 2.67-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2025-01-27] snapd 2.66.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-18] Accepted snapd 2.66.1-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-11-28] Accepted snapd 2.66.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-24] snapd 2.65.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-19] Accepted snapd 2.65.3-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-09-11] snapd 2.65.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-06] Accepted snapd 2.65.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-24] snapd 2.63-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-19] Accepted snapd 2.63-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-17] Accepted snapd 2.63-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-13] Accepted snapd 2.63-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-12] snapd 2.62-5 MIGRATED to testing (Debian testing watch)
  • [2024-06-06] Accepted snapd 2.62-5 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-04] Accepted snapd 2.62-4 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-03] Accepted snapd 2.62-3 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-06-02] snapd 2.62-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-28] Accepted snapd 2.62-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-04-22] snapd 2.62-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-17] Accepted snapd 2.62-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-03-24] snapd 2.61.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-03-08] Accepted snapd 2.61.2-2 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-02-29] Accepted snapd 2.61.2-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • [2024-02-03] snapd 2.61.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-29] Accepted snapd 2.61.1-1 (source) into unstable (Zygmunt Krynicki) (signed by: Zygmunt Bazyli Krynicki)
  • 1
  • 2
bugs [bug history graph]
  • all: 31
  • RC: 1
  • I&N: 27
  • M&W: 3
  • F&P: 0
  • patch: 0
  • NC: 1
links
  • homepage
  • lintian (0, 12)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 26)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.67.1+25.04
  • 472 bugs (6 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing