Ubuntu 4424-1: snapd vulnerabilities

    Date 15 Jul 2020
    156
    Posted By LinuxSecurity Advisories
    An intended access restriction in snapd could be bypassed by strict mode snaps.
    ==========================================================================
    Ubuntu Security Notice USN-4424-1
    July 15, 2020
    
    snapd vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 20.04 LTS
    - Ubuntu 19.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    An intended access restriction in snapd could be bypassed by strict mode
    snaps.
    
    Software Description:
    - snapd: Daemon and tooling that enable snap packages
    
    Details:
    
    It was discovered that cloud-init as managed by snapd on Ubuntu Core 16
    and Ubuntu Core 18 devices ran on every boot without restrictions. A
    physical attacker could exploit this to craft cloud-init
    user-data/meta-data via external media to perform arbitrary changes on
    the device to bypass intended security mechanisms such as full disk
    encryption. This issue did not affect traditional Ubuntu systems.
    (CVE-2020-11933)
    
    It was discovered that snapctl user-open allowed altering the
    XDG_DATA_DIRS environment variable when calling the system xdg-open. A
    malicious snap could exploit this to bypass intended access restrictions
    to control how the host system xdg-open script opens the URL. This issue
    did not affect Ubuntu Core systems. (CVE-2020-11934)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 20.04 LTS:
      snapd                           2.45.1+20.04.2
    
    Ubuntu 19.10:
      snapd                           2.45.1+19.10.2
    
    Ubuntu 18.04 LTS:
      snapd                           2.45.1+18.04.2
    
    Ubuntu 16.04 LTS:
      snapd                           2.45.1ubuntu0.2
    
    In general, a standard system update will make all the necessary changes.
    On Ubuntu, snapd will automatically refresh itself to snapd 2.45.2 which
    is unaffected.
    
    References:
      https://usn.ubuntu.com/4424-1
      CVE-2020-11933, CVE-2020-11934
    
    Package Information:
      https://launchpad.net/ubuntu/+source/snapd/2.45.1+20.04.2
      https://launchpad.net/ubuntu/+source/snapd/2.45.1+19.10.2
      https://launchpad.net/ubuntu/+source/snapd/2.45.1+18.04.2
      https://launchpad.net/ubuntu/+source/snapd/2.45.1ubuntu0.2
    
    

    LinuxSecurity Poll

    Are you planning to use the 1Password password manager now that it is available to Linux users?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/35-are-you-planning-to-use-the-1password-password-manager-now-that-it-is-available-to-linux-users?task=poll.vote&format=json
    35
    radio
    [{"id":"122","title":"Yes","votes":"1","type":"x","order":"1","pct":25,"resources":[]},{"id":"123","title":"No ","votes":"2","type":"x","order":"2","pct":50,"resources":[]},{"id":"124","title":"Not sure at the moment","votes":"1","type":"x","order":"3","pct":25,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.