Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p9v8-q5m4-pf46 | CVE-2024-5138: snapd snapctl auth bypass |
Tue, 26 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical snapd |
|
| CPEs | cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Canonical
Canonical snapd |
Fri, 06 Sep 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-06T19:48:49.508Z
Reserved: 2024-05-19T22:29:02.330Z
Link: CVE-2024-5138
Updated: 2024-08-01T21:03:10.778Z
Status : Analyzed
Published: 2024-05-31T21:15:09.930
Modified: 2025-08-26T17:21:12.027
Link: CVE-2024-5138
No data.
OpenCVE Enrichment
No data.
Github GHSA