CVE-2024-5138

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-05-31 21:15

Updated : 2025-08-26 17:21


NVD link : CVE-2024-5138

Mitre link : CVE-2024-5138

CVE.ORG link : CVE-2024-5138


JSON object : View

Products Affected

canonical

  • snapd
CWE
CWE-20

Improper Input Validation