First published: Fri Dec 04 2020(Updated: )
In some conditions, a snap package built by snapcraft includes the current directory in `LD_LIBRARY_PATH`, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/snapcraft | <4.4.4 | 4.4.4 |
Snapcraft Snapd | <4.4.4 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27348 has been classified as a medium severity vulnerability.
To fix CVE-2020-27348, upgrade your snapcraft version to at least 4.4.4.
CVE-2020-27348 affects snapcraft versions prior to 4.4.4 and specific versions of Ubuntu 16.04 and 18.04.
CVE-2020-27348 allows a malicious snap to gain code execution within the context of another snap.
CVE-2020-27348 can be exploited if both snaps plug the home interface or similar, leveraging the LD_LIBRARY_PATH.