CVE-2020-27348
Publication date 3 December 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
From the Ubuntu Security Team
It was discovered that snapcraft includes the current directory when configuring LD_LIBRARY_PATH for application commands. If a user were tricked into installing a malicious snap or downloading a malicious library, under certain circumstances an attacker could exploit this to affect strict mode snaps that have access to the library and were launched from the directory containing the library.
Status
Package | Ubuntu Release | Status |
---|---|---|
snapcraft | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 2.43.1+18.04.1
|
|
16.04 LTS xenial |
Fixed 2.43.1+16.04.1
|
|
14.04 LTS trusty | Not in release |
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 · Medium |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | Low |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-4661-1
- Snapcraft vulnerability
- 3 December 2020