Linux Security
    Linux Security
    Linux Security

    Ubuntu 4424-1: snapd vulnerabilities

    Date 15 Jul 2020
    Posted By LinuxSecurity Advisories
    An intended access restriction in snapd could be bypassed by strict mode snaps.
    Ubuntu Security Notice USN-4424-1
    July 15, 2020
    snapd vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 20.04 LTS
    - Ubuntu 19.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    An intended access restriction in snapd could be bypassed by strict mode
    Software Description:
    - snapd: Daemon and tooling that enable snap packages
    It was discovered that cloud-init as managed by snapd on Ubuntu Core 16
    and Ubuntu Core 18 devices ran on every boot without restrictions. A
    physical attacker could exploit this to craft cloud-init
    user-data/meta-data via external media to perform arbitrary changes on
    the device to bypass intended security mechanisms such as full disk
    encryption. This issue did not affect traditional Ubuntu systems.
    It was discovered that snapctl user-open allowed altering the
    XDG_DATA_DIRS environment variable when calling the system xdg-open. A
    malicious snap could exploit this to bypass intended access restrictions
    to control how the host system xdg-open script opens the URL. This issue
    did not affect Ubuntu Core systems. (CVE-2020-11934)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 20.04 LTS:
      snapd                           2.45.1+20.04.2
    Ubuntu 19.10:
      snapd                           2.45.1+19.10.2
    Ubuntu 18.04 LTS:
      snapd                           2.45.1+18.04.2
    Ubuntu 16.04 LTS:
      snapd                           2.45.1ubuntu0.2
    In general, a standard system update will make all the necessary changes.
    On Ubuntu, snapd will automatically refresh itself to snapd 2.45.2 which
    is unaffected.
      CVE-2020-11933, CVE-2020-11934
    Package Information:


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"12","type":"x","order":"1","pct":36.36,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.18,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":45.45,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.