CVE-2020-27348

Published: 03 December 2020

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.

From the Ubuntu security team

It was discovered that snapcraft includes the current directory when configuring LD_LIBRARY_PATH for application commands. If a user were tricked into installing a malicious snap or downloading a malicious library, under certain circumstances an attacker could exploit this to affect strict mode snaps that have access to the library and were launched from the directory containing the library.

Priority

Medium

CVSS 3 base score: 6.8

Status

Package Release Status
snapcraft
Launchpad, Ubuntu, Debian
Upstream
Released (4.4.4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable

Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable

Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.43.1+18.04.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.43.1+16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist