CVE-2024-5138

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*

History

26 Aug 2025, 17:21

Type Values Removed Values Added
CPE cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
First Time Canonical
Canonical snapd
References () https://bugs.launchpad.net/snapd/+bug/2065077 - () https://bugs.launchpad.net/snapd/+bug/2065077 - Exploit, Issue Tracking, Patch
References () https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14 - () https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14 - Patch
References () https://github.com/snapcore/snapd/security/advisories/GHSA-p9v8-q5m4-pf46 - () https://github.com/snapcore/snapd/security/advisories/GHSA-p9v8-q5m4-pf46 - Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2024-5138 - () https://www.cve.org/CVERecord?id=CVE-2024-5138 - Third Party Advisory

Information

Published : 2024-05-31 21:15

Updated : 2025-08-26 17:21


NVD link : CVE-2024-5138

Mitre link : CVE-2024-5138

CVE.ORG link : CVE-2024-5138


JSON object : View

Products Affected

canonical

  • snapd
CWE
CWE-20

Improper Input Validation