Vulnerability Report: GO-2024-3009
- CVE-2024-29069, GHSA-69p6-gp5x-j269
- Affects: github.com/snapcore/snapd
- Published: Aug 06, 2024
- Unreviewed
snapd failed to properly check the destination of symbolic links when extracting a snap in github.com/snapcore/snapd. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/snapcore/snapd before v2.62.0.
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-69p6-gp5x-j269 or https://nvd.nist.gov/vuln/detail/CVE-2024-29069.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 2.62.0
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/advisories/GHSA-69p6-gp5x-j269
- https://nvd.nist.gov/vuln/detail/CVE-2024-29069
- https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063
- https://github.com/snapcore/snapd/pull/13682
- https://vuln.go.dev/ID/GO-2024-3009.json