It was discovered that Snapcraft includes the current directory when configuring LDLIBRARYPATH for application commands. If a user were tricked into installing a malicious snap or downloading a malicious library, under certain circumstances an attacker could exploit this to affect strict mode snaps that have access to the library and when launched from the directory containing the library.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.43.1+16.04.1", "binary_name": "snapcraft" }, { "binary_version": "2.43.1+16.04.1", "binary_name": "snapcraft-examples" }, { "binary_version": "2.43.1+16.04.1", "binary_name": "snapcraft-parser" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.43.1+18.04.1", "binary_name": "snapcraft" }, { "binary_version": "2.43.1+18.04.1", "binary_name": "snapcraft-examples" }, { "binary_version": "2.43.1+18.04.1", "binary_name": "snapcraft-parser" } ] }