📦 Snapd

by Canonical

🔍 What is Snapd?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2020-27352

CRITICAL CVSS 9.3 Jun 21, 2024

A privilege escalation vulnerability in snapd's systemd service unit generation allows Docker containers within snaps to gain unintended privileges. When systemd reloads units without Delegate=yes, co...

CVE-2023-1523

CRITICAL CVSS 10.0 Sep 1, 2023

This vulnerability allows malicious snaps to inject terminal input via TIOCLINUX ioctl, potentially executing arbitrary commands outside the snap sandbox after the snap exits. Only affects snaps runni...

CVE-2022-3328

HIGH CVSS 7.8 Jan 8, 2024

CVE-2022-3328 is a race condition vulnerability in snap-confine's must_mkdir_and_open_with_perms() function that could allow local privilege escalation. Attackers could exploit this to gain root privi...

CVE-2021-44730

HIGH CVSS 7.8 Feb 17, 2022

CVE-2021-44730 is a privilege escalation vulnerability in snapd where improper validation of the snap-confine binary location allows local attackers to create hardlinks to arbitrary binaries. When exp...

CVE-2021-4120

HIGH CVSS 8.2 Feb 17, 2022

This vulnerability in snapd allows malicious snaps to bypass strict confinement by injecting arbitrary AppArmor policy rules through malformed content interface and layout declarations. It affects sys...

CVE-2024-29069

MEDIUM CVSS 4.8 Jul 25, 2024

A symbolic link vulnerability in snapd versions before 2.62 allows attackers to write privileged information to world-readable directories. Attackers can exploit this by creating malicious snaps with ...

CVE-2024-1724

MEDIUM CVSS 6.3 Jul 25, 2024

This vulnerability in snapd versions before 2.62 allows malicious snaps with 'home' plug permissions to write arbitrary scripts to the user's $HOME/bin directory. Since Ubuntu automatically adds this ...