CVE-2024-29068

EUVD-2024-2275
In snapd versions prior to 2.62, snapd failed to properly check the file
type when extracting a snap. The snap format is a squashfs file-system
image and so can contain files that are non-regular files (such as pipes 
or sockets etc). Various file entries within the snap squashfs image
(such as icons etc) are directly read by snapd when it is extracted. An 
attacker who could convince a user to install a malicious snap which
contained non-regular files at these paths could then cause snapd to block
indefinitely trying to read from such files and cause a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H
canonicalCNA
5.8 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
Affected Products (NVD)
VendorProductVersion
canonicalsnapd
𝑥
< 2.62
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snapd
bookworm
no-dsa
bullseye
no-dsa
bullseye (security)
vulnerable
forky
2.71-3
fixed
sid
2.71-3
fixed
trixie
2.68.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
bionic
Fixed 2.61.4ubuntu0.18.04.1+esm1
released
focal
Fixed 2.63+20.04ubuntu0.1
released
jammy
Fixed 2.63+22.04ubuntu0.1
released
mantic
ignored
noble
Fixed 2.63+24.04ubuntu0.1
released
oracular
Fixed 2.63+24.10
released
trusty
ignored
xenial
Fixed 2.61.4ubuntu0.16.04.1+esm1
released