CVE-2024-1724:
snapd failed to restrict writes to the $HOME/bin path
6.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.00441%
CWE
Published
7/25/2024
Updated
8/7/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/snapcore/snapd | go | < 2.62 | 2.62 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incomplete AppArmor rule generation in the home interface implementation. The patch adds a specific denial for the $HOME/bin directory node in home.go
, indicating the original code lacked this critical restriction. While no traditional 'function' is explicitly named in the diff, the rule generation logic in home.go
(manifested as template literals and their processing) constitutes the vulnerable code path. The test modifications in home_test.go
confirm this was the location of the missing security control.