OXIESEC PANEL
- Current Dir:
/
/
snap
/
core
/
17210
/
usr
/
lib
/
snapd
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
10/02/2024 07:52:55 PM
rwxr-xr-x
📄
complete.sh
5.27 KB
06/04/2024 10:58:39 PM
rw-r--r--
📄
etelpmoc.sh
6.87 KB
06/04/2024 10:58:39 PM
rw-r--r--
📄
info
118 bytes
06/06/2024 02:26:56 PM
rw-r--r--
📄
snap-bootstrap
9.64 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-confine
124.53 KB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-device-helper
38.52 KB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-discard-ns
26.45 KB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-exec
3.92 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-failure
2.48 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-fde-keymgr
3.54 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-gdb-shim
924.8 KB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-gdbserver-shim
924.8 KB
06/06/2024 02:32:02 PM
rwxr-xr-x
📄
snap-mgmt
8.79 KB
06/06/2024 02:31:58 PM
rwxr-xr-x
📄
snap-preseed
8.59 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-recovery-chooser
6.66 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-repair
6.72 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snap-seccomp
2.02 MB
06/06/2024 02:32:02 PM
rwxr-xr-x
📄
snap-update-ns
4.69 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snapctl
6.13 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snapd
20.72 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snapd-apparmor
2.04 MB
06/06/2024 02:32:03 PM
rwxr-xr-x
📄
snapd.core-fixup.sh
3.74 KB
06/06/2024 02:31:58 PM
rwxr-xr-x
📄
snapd.run-from-snap
73 bytes
06/06/2024 02:31:58 PM
rwxr-xr-x
📄
sshd-host-keygen
1.53 KB
10/02/2024 07:41:37 PM
rwxr-xr-x
📄
system-shutdown
22.41 KB
06/06/2024 02:32:03 PM
rwxr-xr-x
Editing: snapd.core-fixup.sh
Close
#!/bin/sh set -e if ! grep -q "ID=ubuntu-core" /etc/os-release; then # this code is only relevant on ubuntu-core devices # # this script will only run via systemd if /writable/system-data # exists however we still add this check here in case people run # it manually exit 0 fi # No fix-ups yet on UC20 if grep -q snapd_recovery_mode= /proc/cmdline; then exit 0 fi # Workaround https://forum.snapcraft.io/t/5253 # # We see sometimes corrupted uboot.env files created by fsck.vfat. # On the fat filesystem they are indistinguishable because one # has a fat16 name UBOOT.ENV (and not lfn (long-file-name)) but # the other has a "uboot.env" lfn name and a FSCK0000.000 FAT16 # name. The only known workaround is to remove all dupes and put # one file back in place. if [ "$(find /boot/uboot -name uboot.env | wc -l)" -gt 1 ]; then echo "Corrupted uboot.env file detected" # Ensure we have one uboot.env to go back to. Note that it does # not matter which one we pick (we can't choose anyway, we get # whatever the kernel gives us). The key part is that there is # only a single one after this script finishes. The bootloader # logic will recover in any case. cp -a /boot/uboot/uboot.env /boot/uboot/uboot.env.save # now delete all dupes while ls /boot/uboot/uboot.env 2>/dev/null; do rm -f /boot/uboot/uboot.env done # and move the saved one into place mv /boot/uboot/uboot.env.save /boot/uboot/uboot.env # ensure we sync the fs sync fi # The code below deals with incorrect permissions that happened on # some buggy ubuntu-image versions. # # This needs to run only once so we can exit here. if [ -f /var/lib/snapd/device/ownership-change.after ]; then exit 0 fi # store important data in case we need it later if [ ! -f /var/lib/snapd/device/ownership-change.before ]; then mkdir -p /var/lib/snapd/device find /etc/cloud /var/lib/cloud /var/lib/snapd -printf '%M %U %G %p\n' > /var/lib/snapd/device/ownership-change.before.tmp || true find /writable/system-data /writable/system-data/var /writable/system-data/var/lib /writable/system-data/boot /writable/system-data/etc -maxdepth 0 -printf '%M %U %G %p\n' >> /var/lib/snapd/device/ownership-change.before.tmp || true mv /var/lib/snapd/device/ownership-change.before.tmp /var/lib/snapd/device/ownership-change.before fi # cleanup read/write files and directories (CVE-2017-10600) for i in /etc/cloud /var/lib/cloud /var/lib/snapd ; do # restore ownership to root:root find "$i" \( -type f -o -type d -o -type l \) -a \( \! -uid 0 -o \! -gid 0 \) -print0 | \ xargs -0 --no-run-if-empty chown -c --no-dereference root:root -- || true done # cleanup a few /writable directories without descending for i in /writable/system-data /writable/system-data/var /writable/system-data/var/lib /writable/system-data/boot /writable/system-data/etc ; do # restore ownership to root:root find "$i" -maxdepth 0 \( \! -uid 0 -o \! -gid 0 -o -type l \) -print0 | \ xargs -0 --no-run-if-empty chown -c --no-dereference root:root -- || true done # store permissions after manipulation, this is also used as the stamp file # for the systemd service to ensure it is only run once find /etc/cloud /var/lib/cloud /var/lib/snapd -printf '%M %U %G %p\n' > /var/lib/snapd/device/ownership-change.after.tmp # Note: this find will fail on UC20 seeding because there is no # /writable/system-data/boot find /writable/system-data /writable/system-data/var /writable/system-data/var/lib /writable/system-data/boot /writable/system-data/etc -maxdepth 0 -printf '%M %U %G %p\n' >> /var/lib/snapd/device/ownership-change.after.tmp mv /var/lib/snapd/device/ownership-change.after.tmp /var/lib/snapd/device/ownership-change.after # ensure things are really on disk sync