CVE-2020-27348

Publication date 3 December 2020

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.8 · Medium

Score breakdown

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.

From the Ubuntu Security Team

It was discovered that snapcraft includes the current directory when configuring LD_LIBRARY_PATH for application commands. If a user were tricked into installing a malicious snap or downloading a malicious library, under certain circumstances an attacker could exploit this to affect strict mode snaps that have access to the library and were launched from the directory containing the library.

Read the notes from the security team

Status

Package Ubuntu Release Status
snapcraft 20.10 groovy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Fixed 2.43.1+18.04.1
16.04 LTS xenial
Fixed 2.43.1+16.04.1
14.04 LTS trusty Not in release

Notes


emitorino

Focal, groovy and hirsute are not required due to deb2snap

Severity score breakdown

Parameter Value
Base score 6.8 · Medium
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

References

Related Ubuntu Security Notices (USN)

    • USN-4661-1
    • Snapcraft vulnerability
    • 3 December 2020

Other references