Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: snapdragon-profiler

Found 9 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-3888
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 5 days, 1 hour ago
Local Privilege Escalation in snapd

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Affected products

snapd
  • *
  • <2.75.1

Matching in nixpkgs

Dismissed
Permalink CVE-2025-47397
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Improper Release of Memory Before Removing Last Reference in Graphics

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

Affected products

Snapdragon
  • ==QCA6797AQ
  • ==SA7255P
  • ==QAM8295P
  • ==SA7775P
  • ==SAR2230P
  • ==SXR2230P
  • ==SAR2130P
  • ==SA8295P
  • ==WCD9335
  • ==SW5100P
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==SA8195P
  • ==SXR2250P
  • ==Snapdragon 460 Mobile Platform
  • ==Snapdragon 8 Elite
  • ==SM8635P
  • ==WCN6450
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==G2 Gen 1
  • ==SW5100
  • ==QCA6391
  • ==SM8635
  • ==QCA6696
  • ==QLN1086BD
  • ==QMP1000
  • ==QCS6690
  • ==WCN3910
  • ==QCA6688AQ
  • ==QCM5430
  • ==QXM1094
  • ==Palawan25
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==SM8650Q
  • ==QRB5165N
  • ==SA8620P
  • ==QCA6698AQ
  • ==WCN7880
  • ==SW6100
  • ==WCN7861
  • ==WSA8840
  • ==QAMSRV1H
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==Snapdragon 7 Gen 4 Mobile Platform
  • ==QCM8838
  • ==Vision Intelligence 400 Platform
  • ==Kalpeni
  • ==TalynPlus
  • ==QCM4490
  • ==SRV1H
  • ==SM6225P
  • ==G1 Gen 1
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QCA6595
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCA6574AU
  • ==QPA1086BD
  • ==Themisto
  • ==QCA8695AU
  • ==QXM1095
  • ==Monaco_IOT
  • ==WCN6650
  • ==QLN1083BD
  • ==QCA6574
  • ==WCN7860
  • ==SD865 5G
  • ==LeMans_AU_LGIT
  • ==QCA6698AU
  • ==SA8155P
  • ==WCN7881
  • ==SSG2125P
  • ==SM7675P
  • ==SAR1250P
  • ==WCD9380
  • ==WCN3988
  • ==Milos_IOT
  • ==SXR2330P
  • ==QAM8255P
  • ==WCD9341
  • ==IQ6 Series Platform
  • ==SRV1L
  • ==SRV1M
  • ==WCD9370
  • ==SA6155P
  • ==SW6100P
  • ==SA8255P
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==SXR2350P
  • ==QCA6574A
  • ==QCM2290
  • ==QXM1093
  • ==WSA8845
  • ==FastConnect 6700
  • ==QXM1096
  • ==QCS4490
  • ==Snapdragon 8 Elite Gen 5
  • ==SA8770P
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==WCD9385
  • ==QPA1083BD
  • ==WCN6755
  • ==QCM6490
  • ==Robotics RB5 Platform
  • ==SD662
  • ==QCS2290
  • ==WCD9395
  • ==SXR1230P
  • ==SSG2115P
  • ==QCN9012
  • ==SA9000P
  • ==QMB415
  • ==Pandeiro
  • ==QCS4290
  • ==LeMansAU
  • ==Snapdragon 695 5G Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==Flight RB5 5G Platform
  • ==SM7635P
  • ==QCS8550
  • ==IQ9 Series Platform
  • ==QCA6678AQ
  • ==WSA8810
  • ==SD 8 Gen1 5G
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCN3980
  • ==WSA8845H
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SDR753
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==QCN9274
  • ==WCN3950
  • ==QMB715
  • ==WSA8830
  • ==Snapdragon 480 5G Mobile Platform
  • ==Milos
  • ==QAMSRV1M
  • ==QAM8620P
  • ==QCM6125
  • ==Snapdragon 680 4G Mobile Platform
  • ==QAM8397P
  • ==QCM4325
  • ==SM8750P
  • ==SM6650P
  • ==Snapdragon 662 Mobile Platform
  • ==WCD9378
  • ==WCD9375
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==QCN9011
  • ==SM8550P
  • ==WSA8835
  • ==WSA8832
  • ==FastConnect 7800
  • ==QCA6595AU
  • ==QCM8550
  • ==IQ10 Series
  • ==IQ8 Series Platform
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM7675
  • ==Orne
  • ==WCN3990
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==Snapdragon 685 4G Mobile Platform
  • ==QAM8797P
  • ==WSA8815
  • ==WCD9390
  • ==Snapdragon XR2 5G Platform

Matching in nixpkgs

Not present in nixpkgs
Untriaged
Permalink CVE-2023-1523
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Using the TIOCLINUX ioctl request, a malicious snap could inject …

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

Affected products

snapd
  • ==2.59.5

Matching in nixpkgs

Untriaged
Permalink CVE-2024-29069
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
snapd will follow archived symlinks when unpacking a filesystem

In snapd versions prior to 2.62, snapd failed to properly check the destination of symbolic links when extracting a snap. The snap format is a squashfs file-system image and so can contain symbolic links and other file types. Various file entries within the snap squashfs image (such as icons and desktop files etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained symbolic links at these paths could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow an unprivileged user to gain access to privileged information.

Affected products

snapd
  • <2.62

Matching in nixpkgs

Untriaged
Permalink CVE-2024-1724
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
snapd allows $HOME/bin symlink

In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.

Affected products

snapd
  • <2.62

Matching in nixpkgs

Untriaged
Permalink CVE-2024-29068
5.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
snapd non-regular file indefinite blocking read

In snapd versions prior to 2.62, snapd failed to properly check the file type when extracting a snap. The snap format is a squashfs file-system image and so can contain files that are non-regular files (such as pipes or sockets etc). Various file entries within the snap squashfs image (such as icons etc) are directly read by snapd when it is extracted. An attacker who could convince a user to install a malicious snap which contained non-regular files at these paths could then cause snapd to block indefinitely trying to read from such files and cause a denial of service.

Affected products

snapd
  • <2.62

Matching in nixpkgs

Untriaged
Permalink CVE-2020-27352
9.3 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
When generating the systemd service units for the docker snap …

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

Affected products

snapd
  • <2.48.3

Matching in nixpkgs

Untriaged
Permalink CVE-2024-5138
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
The snapctl component within snapd allows a confined snap to …

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.

References

Affected products

snapd
  • <68ee9c6aa916ab87dbfd9a26030690f2cabf1e14

Matching in nixpkgs

Untriaged
Permalink CVE-2022-3328
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Race condition in snap-confine's must_mkdir_and_open_with_perms()

Race condition in snap-confine's must_mkdir_and_open_with_perms()

Affected products

snapd
  • <2.61.1

Matching in nixpkgs