CVE-2020-27348

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
References
Link Resource
https://bugs.launchpad.net/bugs/1901572 Exploit Issue Tracking Third Party Advisory
https://github.com/snapcore/snapcraft/pull/3345 Third Party Advisory
https://usn.ubuntu.com/usn/usn-4661-1 Patch Third Party Advisory
https://bugs.launchpad.net/bugs/1901572 Exploit Issue Tracking Third Party Advisory
https://github.com/snapcore/snapcraft/pull/3345 Third Party Advisory
https://usn.ubuntu.com/usn/usn-4661-1 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapcraft:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://bugs.launchpad.net/bugs/1901572 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/bugs/1901572 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/snapcore/snapcraft/pull/3345 - Third Party Advisory () https://github.com/snapcore/snapcraft/pull/3345 - Third Party Advisory
References () https://usn.ubuntu.com/usn/usn-4661-1 - Patch, Third Party Advisory () https://usn.ubuntu.com/usn/usn-4661-1 - Patch, Third Party Advisory

Information

Published : 2020-12-04 03:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27348

Mitre link : CVE-2020-27348

CVE.ORG link : CVE-2020-27348


JSON object : View

Products Affected

canonical

  • snapcraft
  • ubuntu_linux
CWE
CWE-427

Uncontrolled Search Path Element