CVE-2024-29069

4.8 MEDIUM

📋 TL;DR

A symbolic link vulnerability in snapd versions before 2.62 allows attackers to write privileged information to world-readable directories. Attackers can exploit this by creating malicious snaps with specially crafted symbolic links. Users who install untrusted snaps on affected snapd versions are vulnerable.

💻 Affected Systems

Products:
  • snapd
Versions: All versions prior to 2.62
Operating Systems: Linux distributions using snapd
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of snapd on supported Linux distributions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged information disclosure leading to privilege escalation or sensitive data exposure

🟠

Likely Case

Information disclosure of system files or snap configuration data

🟢

If Mitigated

No impact if only trusted snaps from official repositories are installed

🌐 Internet-Facing: MEDIUM - Requires user to install malicious snap, which could come from untrusted sources
🏢 Internal Only: LOW - Internal users would need to intentionally install malicious snaps

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires convincing user to install malicious snap; exploitation requires knowledge of snap internals

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.62 and later

Vendor Advisory: https://github.com/snapcore/snapd/pull/13682

Restart Required: No

Instructions:

1. Update snapd: sudo snap refresh snapd
2. Verify version: snap version
3. Ensure version is 2.62 or higher

🔧 Temporary Workarounds

Restrict snap sources

linux

Only install snaps from trusted sources like the official snap store

Disable snapd temporarily

linux

Stop snapd service if not needed

sudo systemctl stop snapd
sudo systemctl disable snapd

🧯 If You Can't Patch

  • Only install snaps from official snap store
  • Implement strict snap installation policies and user training

🔍 How to Verify

Check if Vulnerable:

Check snapd version: snap version | grep snapd

Check Version:

snap version | grep snapd

Verify Fix Applied:

Verify snapd version is 2.62 or higher: snap version

📡 Detection & Monitoring

Log Indicators:

  • Unusual snap installation activity
  • Snap installation from non-standard sources

Network Indicators:

  • Downloads of snap packages from untrusted sources

SIEM Query:

process.name="snapd" AND event.action="install" AND NOT source.url CONTAINS "snapcraft.io"

🔗 References

📤 Share & Export