Vulnerabilities > Canonical > Snapd > High

DATE CVE VULNERABILITY TITLE RISK
2024-07-25 CVE-2024-29069 Link Following vulnerability in Canonical Snapd
In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap.
local
low complexity
canonical CWE-59
7.3
2024-07-25 CVE-2024-1724 Incorrect Permission Assignment for Critical Resource vulnerability in Canonical Snapd
In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path.
local
low complexity
canonical CWE-732
8.2
2024-01-08 CVE-2022-3328 Race Condition vulnerability in Canonical Snapd and Ubuntu Linux
Race condition in snap-confine's must_mkdir_and_open_with_perms()
local
high complexity
canonical CWE-362
7.0
2022-02-17 CVE-2021-44730 Link Following vulnerability in multiple products
snapd 2.54.2 did not properly validate the location of the snap-confine binary.
local
low complexity
canonical fedoraproject debian CWE-59
8.8
2022-02-17 CVE-2021-44731 Race Condition vulnerability in multiple products
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap.
local
high complexity
canonical fedoraproject debian CWE-362
7.8
2022-02-17 CVE-2021-4120 Improper Input Validation vulnerability in multiple products
snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement.
local
low complexity
canonical fedoraproject CWE-20
7.8
2019-04-24 CVE-2019-11503 Link Following vulnerability in Canonical Snapd
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
network
low complexity
canonical CWE-59
7.5