CVE-2024-29068
- EPSS 0.01%
- Veröffentlicht 25.07.2024 20:15:04
- Zuletzt bearbeitet 21.11.2024 09:07:29
In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image and so can contain files that are non-regular files (such as pipes or sockets etc). Various file en...
CVE-2024-29069
- EPSS 0.03%
- Veröffentlicht 25.07.2024 20:15:04
- Zuletzt bearbeitet 21.11.2024 09:07:29
In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries wi...
CVE-2024-1724
- EPSS 0.02%
- Veröffentlicht 25.07.2024 19:15:09
- Zuletzt bearbeitet 21.11.2024 08:51:10
In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could ...
CVE-2020-27352
- EPSS 0.11%
- Veröffentlicht 21.06.2024 20:15:10
- Zuletzt bearbeitet 26.08.2025 17:20:35
When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main ...
CVE-2024-5138
- EPSS 0.94%
- Veröffentlicht 31.05.2024 21:15:09
- Zuletzt bearbeitet 26.08.2025 17:21:12
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged us...
- EPSS 0.11%
- Veröffentlicht 08.01.2024 18:15:45
- Zuletzt bearbeitet 03.06.2025 15:15:24
Race condition in snap-confine's must_mkdir_and_open_with_perms()
- EPSS 0.1%
- Veröffentlicht 01.09.2023 19:15:42
- Zuletzt bearbeitet 21.11.2024 07:39:21
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal ...
CVE-2021-3155
- EPSS 0.03%
- Veröffentlicht 17.02.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:21:00
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+...
CVE-2021-44730
- EPSS 0.14%
- Veröffentlicht 17.02.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:31:28
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in ...
CVE-2021-44731
- EPSS 2.26%
- Veröffentlicht 17.02.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:31:28
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namesp...