Skip to content

Duplicate Advisory: CVE-2024-5138: snapd snapctl auth bypass

High severity GitHub Reviewed Published May 31, 2024 to the GitHub Advisory Database • Updated Jan 16, 2025
Withdrawn This advisory was withdrawn on Jan 16, 2025

Package

gomod github.com/snapcore/snapd (Go)

Affected versions

>= 2.51.6, < 2.63.1

Patched versions

2.63.1

Description

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-p9v8-q5m4-pf46. This link is maintained to preserve external references.

Original Description

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.

References

Published by the National Vulnerability Database May 31, 2024
Published to the GitHub Advisory Database May 31, 2024
Reviewed Jan 16, 2025
Withdrawn Jan 16, 2025
Last updated Jan 16, 2025

Severity

High

EPSS score

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-jrr7-64m9-x984

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.