Externally Controlled Reference to a Resource in Another Sphere (CWE-610)
In snapd versions prior to 2.62, there is a vulnerability where snapd fails to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image that can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files) are directly read by snapd when it is extracted. This vulnerability could allow an attacker to exploit the improper handling of symbolic links.
An attacker who could convince a user to install a malicious snap containing symbolic links at specific paths could cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This could allow an unprivileged user to gain access to privileged information. The vulnerability has low impact on confidentiality, integrity, and availability. The CVSS v3.1 base score for this vulnerability is 4.8, which is considered medium severity. The attack vector is local, requires low attack complexity, low privileges, and user interaction.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. The vulnerability is fixed in snapd version 2.62 and later.
Update snapd to version 2.62 or later. Until the update can be applied, be cautious when installing snaps from untrusted sources. Educate users about the risks of installing snaps from unknown or untrusted sources. Consider implementing additional access controls or monitoring for suspicious activities related to snap installations.
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
NVD published the first details for CVE-2024-29069
A CVSS base score of 4.8 has been assigned.
Feedly found the first article mentioning CVE-2024-29069. See article
Feedly estimated the CVSS score as MEDIUM
This CVE started to trend in security discussions
EPSS Score was set to: 0.04% (Percentile: 9.4%)
This CVE stopped trending in security discussions
The vulnerability CVE-2024-29069 in snapd versions prior to 2.62 allows an attacker to write out the contents of symbolic link destinations into a world-readable directory, potentially granting access to privileged information. This critical vulnerability has a CVSS score of 4.8 and could be exploited by convincing a user to install a malicious snap. Mitigations include updating to snapd version 2.62 or later to patch the issue. See article
Detection for the vulnerability has been added to Nessus (204952)