CVE-2020-27348

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
References
Link Resource
https://usn.ubuntu.com/usn/usn-4661-1 Patch Third Party Advisory
https://github.com/snapcore/snapcraft/pull/3345 Third Party Advisory
https://bugs.launchpad.net/bugs/1901572 Exploit Issue Tracking Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapcraft:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*

Information

Published : 2020-12-03 19:15

Updated : 2020-12-14 12:36


NVD link : CVE-2020-27348

Mitre link : CVE-2020-27348


JSON object : View

CWE
CWE-427

Uncontrolled Search Path Element

Advertisement

dedicated server usa

Products Affected

canonical

  • ubuntu_linux
  • snapcraft