CVE-2020-27348

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
References
Link Resource
https://bugs.launchpad.net/bugs/1901572 Exploit Issue Tracking Third Party Advisory
https://github.com/snapcore/snapcraft/pull/3345 Third Party Advisory
https://usn.ubuntu.com/usn/usn-4661-1 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapcraft:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-12-04 03:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-27348

Mitre link : CVE-2020-27348

CVE.ORG link : CVE-2020-27348


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • snapcraft
CWE
CWE-427

Uncontrolled Search Path Element