← Volver a CVEs
CVE-2024-5138
HIGH8.1
Descripcion
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
Detalles CVE
Puntuacion CVSS v3.18.1
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado5/31/2024
Ultima modificacion8/26/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:snapd
Debilidades (CWE)
CWE-20
Referencias
https://bugs.launchpad.net/snapd/+bug/2065077(security@ubuntu.com)
https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14(security@ubuntu.com)
https://github.com/snapcore/snapd/security/advisories/GHSA-p9v8-q5m4-pf46(security@ubuntu.com)
https://www.cve.org/CVERecord?id=CVE-2024-5138(security@ubuntu.com)
https://bugs.launchpad.net/snapd/+bug/2065077(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/snapcore/snapd/security/advisories/GHSA-p9v8-q5m4-pf46(af854a3a-2127-422b-91ae-364da2661108)
https://www.cve.org/CVERecord?id=CVE-2024-5138(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.