In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.
History

Mon, 26 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical snapd
CPEs cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical snapd

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2024-07-25T19:05:23.299Z

Updated: 2024-08-01T18:48:21.887Z

Reserved: 2024-02-21T19:46:47.236Z

Link: CVE-2024-1724

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.887Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-25T19:15:09.913

Modified: 2024-08-26T16:44:59.357

Link: CVE-2024-1724

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-25T00:00:00Z

Links: CVE-2024-1724 - Bugzilla