Количество 6
Количество 6

CVE-2024-5138
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.

CVE-2024-5138
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
CVE-2024-5138
The snapctl component within snapd allows a confined snap to interact ...
GHSA-p9v8-q5m4-pf46
CVE-2024-5138: snapd snapctl auth bypass

BDU:2024-06998
Уязвимость компонента snapctl утилиты для управления самодостаточными пакетами snapd, связанная с неправильной проверкой входных данных, позволяющая нарушителю повысить свои привилегии

ROS-20240910-07
Множественные уязвимости snapd
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-5138 The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar. | CVSS3: 8.1 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-5138 The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar. | CVSS3: 8.1 | 0% Низкий | около 1 года назад |
CVE-2024-5138 The snapctl component within snapd allows a confined snap to interact ... | CVSS3: 8.1 | 0% Низкий | около 1 года назад | |
GHSA-p9v8-q5m4-pf46 CVE-2024-5138: snapd snapctl auth bypass | CVSS3: 4 | 0% Низкий | 5 месяцев назад | |
![]() | BDU:2024-06998 Уязвимость компонента snapctl утилиты для управления самодостаточными пакетами snapd, связанная с неправильной проверкой входных данных, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.1 | 0% Низкий | около 1 года назад |
![]() | ROS-20240910-07 Множественные уязвимости snapd | CVSS3: 8.1 | 10 месяцев назад |
Уязвимостей на страницу