Vulnerabilities (CVE)

Filtered by vendor Canonical Subscribe
Filtered by product Snapd
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3328 1 Canonical 2 Snapd, Ubuntu Linux 2024-01-12 N/A 7.0 HIGH
Race condition in snap-confine's must_mkdir_and_open_with_perms()
CVE-2021-44730 3 Canonical, Debian, Fedoraproject 4 Snapd, Ubuntu Linux, Debian Linux and 1 more 2022-02-28 6.9 MEDIUM 8.8 HIGH
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
CVE-2019-7303 1 Canonical 2 Snapd, Ubuntu Linux 2020-10-16 5.0 MEDIUM 7.5 HIGH
A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.
CVE-2019-11503 1 Canonical 1 Snapd 2019-07-13 5.0 MEDIUM 7.5 HIGH
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
CVE-2019-11502 1 Canonical 1 Snapd 2019-05-02 5.0 MEDIUM 7.5 HIGH
snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.