Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/snapcore/snapd
  4. ›
  5. GHSA-jrr7-64m9-x984

GHSA-jrr7-64m9-x984: Duplicate Advisory: CVE-2024-5138: snapd snapctl auth bypass

May 31, 2024 (updated January 16, 2025)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-p9v8-q5m4-pf46. This link is maintained to preserve external references.

Original Description

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.

References

  • bugs.launchpad.net/snapd/+bug/2065077
  • github.com/advisories/GHSA-jrr7-64m9-x984
  • github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14
  • github.com/snapcore/snapd/security/advisories/GHSA-p9v8-q5m4-pf46
  • nvd.nist.gov/vuln/detail/CVE-2024-5138
  • www.cve.org/CVERecord?id=CVE-2024-5138

Code Behaviors & Features

Detect and mitigate GHSA-jrr7-64m9-x984 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.51.6 before 2.63.1

Fixed versions

  • 2.63.1

Solution

Upgrade to version 2.63.1 or above.

Source file

go/github.com/snapcore/snapd/GHSA-jrr7-64m9-x984.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:37 +0000.