CVE-2024-29069

CWE-610CWE-599 documents6 sources
Severity
7.3HIGH
EPSS
0.0%
top 89.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25
Latest updateJan 13

Description

In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:LExploitability: 1.3 | Impact: 3.4

Affected Packages4 packages

CVEListV5canonical/snapd< 2.62
NVDcanonical/snapd< 2.62
Debiansnapd< 2.62-1+1

Patches

🔴Vulnerability Details

5
OSV
snapd failed to properly check the destination of symbolic links when extracting a snap in github.com/snapcore/snapd2024-08-06
OSV
CVE-2024-29069: In snapd versions prior to 22024-07-25
GHSA
snapd failed to properly check the destination of symbolic links when extracting a snap2024-07-25
OSV
snapd failed to properly check the destination of symbolic links when extracting a snap2024-07-25
CVEList
snapd will follow archived symlinks when unpacking a filesystem2024-07-25

📋Vendor Advisories

3
Ubuntu
snapd vulnerabilities2025-01-13
Ubuntu
snapd vulnerabilities2024-08-01
Debian
CVE-2024-29069: snapd - In snapd versions prior to 2.62, snapd failed to properly check the destination ...2024
CVE-2024-29069 (HIGH CVSS 7.3) | In snapd versions prior to 2.62 | cvebase.io