CVE-2024-29069
Linux Debian vulnerability analysis and mitigation

Overview

In snapd versions prior to 2.62, a vulnerability was discovered where snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format, being a squashfs file-system image, can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files) are directly read by snapd during extraction (NVD).

Technical details

The vulnerability stems from improper validation of symbolic links during snap package extraction. When snapd processes a snap package, it reads various file entries directly from the squashfs image. The vulnerability occurs because snapd doesn't properly verify the destination of symbolic links, which could lead to writing contents to world-readable directories. The issue has been assigned a CVSS v3.1 base score of 4.8 MEDIUM (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L) by Canonical, while NVD rates it as 7.3 HIGH (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) (NVD).

Impact

If exploited, this vulnerability could allow an attacker who convinces a user to install a malicious snap containing crafted symbolic links to cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This could subsequently allow an unprivileged user to gain access to privileged information (Ubuntu Security).

Mitigation and workarounds

The vulnerability has been fixed in snapd version 2.62 and later. Users are advised to update their systems to the patched version. For Ubuntu users, the fixed versions are: snapd 2.63+24.04ubuntu0.1 for Ubuntu 24.04, 2.63+22.04ubuntu0.1 for Ubuntu 22.04, and 2.63+20.04ubuntu0.1 for Ubuntu 20.04. A standard system update will make all the necessary changes (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59030HIGH7.5
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-59029MEDIUM5.3
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-devel
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • bpftool
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-trace
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management