Package: snapd / 2.49-1+deb11u2
Metadata
Package | Version | Patches format |
---|---|---|
snapd | 2.49-1+deb11u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 cmd snap seccomp use upstream seccomp package.patch | (download) |
cmd/snap-seccomp/main.go |
5 1 + 4 - 0 ! |
[patch 1/9] cmd/snap-seccomp: use upstream seccomp package Upstream snapd uses a fork that carries additional compatibility patch required to build snapd for Ubuntu 14.04. This patch is not required with the latest snapshot of the upstream seccomp golang bindings but they are neither released upstream nor backported (in their entirety) to Ubuntu 14.04. The forked seccomp library is not packaged in Debian. As such, to build snapd, we need to switch to the regular, non-forked package name. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> Signed-off-by: Maciej Borzecki <maciej.zenon.borzecki@canonical.com> |
0002 cmd snap seccomp skip tests that fail on 4.19.patch | (download) |
cmd/snap-seccomp/main_test.go |
3 3 + 0 - 0 ! |
[patch 2/9] cmd/snap-seccomp: skip tests that fail on 4.19 It seems that the Debian 4.19.0-1 kernel contains a regression in seccomp execution. While this issue is investigated in parallel along with the security team, the release of updated snapd package should not be held by this issue. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0003 cmd snap seccomp skip tests that use m32.patch | (download) |
cmd/snap-seccomp/main_test.go |
8 8 + 0 - 0 ! |
[patch 3/9] cmd/snap-seccomp: skip tests that use -m32 Apparently Debian's amd64 compiler somehow cannot compile -m32 mode binaries. The compilation error is: multipass@debian-10:~/packaging/snapd/cmd/snap-seccomp$ go test cannot build multi-lib syscall runner: exit status 1 In file included from /usr/include/errno.h:25, from /tmp/check-3806730340354206876/1/seccomp_syscall_runner.c:3: /usr/include/features.h:424:12: fatal error: sys/cdefs.h: No such file or directory # include <sys/cdefs.h> ^~~~~~~~~~~~~ compilation terminated. OK: 2 passed, 11 skipped I was unable to resolve this issue, let's disable this test until we can get to the bottom of it. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0004 cmd snap skip tests depending on text wrapping.patch | (download) |
cmd/snap/cmd_alias_test.go |
1 1 + 0 - 0 ! |
[patch 4/9] cmd/snap: skip tests depending on text wrapping Upstream snapd contains tests that check the output of various commands along with the --help command-line argument. The output is wrapped to match terminal width and for readability. The algorithm for wrapping has apparently changed across versions of github.com/jessevdk/go-flags. Since this test is not critical for anything it can be disabled to let the package build. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0005 advisor errtracker use upstream bolt package.patch | (download) |
advisor/backend.go |
2 1 + 1 - 0 ! |
[patch 5/9] advisor,errtracker: use upstream bolt package Upstream snapd uses a fork of the bolt package that carries additional patches for bugs that were discovered by snapd developers. Bolt itself appears to be an abandoned project and is not accepting any new patches. In various distributions the upstream bolt package may or may not have been patched but the forked version was definitely not packaged. As such, to build snapd in Debian the upstream bolt package name must be used. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0006 systemd disable snapfuse system.patch | (download) |
systemd/systemd.go |
2 0 + 2 - 0 ! |
[patch 6/9] systemd: disable snapfuse system Upstream snapd uses an elaborate hack to bundle squashfuse under the name snapfuse, and built as a fake go package. This component is not available in Debian where bundling elements is not allowed. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0007 i18n use dummy localizations to avoid dependencies.patch | (download) |
i18n/i18n.go |
97 6 + 91 - 0 ! |
[patch 7/9] i18n: use dummy localizations to avoid dependencies Upstream snapd uses the github.com/ojii/gettext.go package for access to translation catalogs. This package is currently not available in Debian and prevents building the package. As such, replace the real implementation with a simple dummy one that always uses the English input strings. Signed-off-by: Zygmunt Krynicki <me@zygoon.pl> |
0010 man page sections.patch | (download) |
cmd/snap-discard-ns/snap-discard-ns.rst |
2 1 + 1 - 0 ! |
--- |
0013 cherry pick pr9936.patch | (download) |
interfaces/apparmor/backend.go |
38 0 + 38 - 0 ! |
--- |
0015 cve 2021 44730 44731 4120.patch | (download) |
cmd/libsnap-confine-private/apparmor-support.c |
32 20 + 12 - 0 ! |
--- |
0016 cve 2021 2021 44730 44731 4120 auto remove.patch | (download) |
overlord/devicestate/firstboot_test.go |
9 8 + 1 - 0 ! |
--- |
0017 cve 2022 3328 1.patch | (download) |
data/Makefile |
1 1 + 0 - 0 ! |
[patch 1/4] data: add systemd-tmpfiles configuration to create private tmp dir Use systemd-tmpfiles to create the private tmp mount namespace root dir (/tmp/snap-private-tmp) on boot as owned by root with restrictive permissions. We can use this as a known location to then create per-snap private tmp mount namespace dirs (/tmp/snap-private-tmp/snap.$SNAP_INSTANCE) etc. Signed-off-by: Alex Murray <alex.murray@canonical.com> |
0018 cve 2022 3328 2.patch | (download) |
cmd/snap-confine/mount-support-test.c |
40 0 + 40 - 0 ! |
[patch 2/4] many: use /tmp/snap-private-tmp for per-snap private tmps To avoid unprivileged users being able to interfere with the creation of the private snap mount namespace, instead of creating this as /tmp/snap.$SNAP_NAME/ we can now use the systemd-tmpfiles configuration to do this for us at boot with a known fixed name (/tmp/snap-private-tmp/) and then use that as the base dir for creating per-snap private tmp mount namespaces (eg. /tmp/snap-private-tmp/snap.$SNAP_INSTANCE/tmp) etc. Signed-off-by: Alex Murray <alex.murray@canonical.com> |
0019 cve 2022 3328 3.patch | (download) |
overlord/snapstate/snapmgr.go |
8 4 + 4 - 0 ! |
[patch 4/4] overlord/snapmgr: bump vulnerable snap version check This should ensure that any older versions of snapd that are vulnerable to this new CVE-2022-3328 are uninstalled on upgrade to the fixed version. Signed-off-by: Alex Murray <alex.murray@canonical.com> |