Lucene search

K
osvGoogleOSV:USN-4661-1
HistoryDec 03, 2020 - 6:35 p.m.

snapcraft vulnerability

2020-12-0318:35:20
Google
osv.dev
3

0.001 Low

EPSS

Percentile

38.8%

It was discovered that Snapcraft includes the current directory when
configuring LD_LIBRARY_PATH for application commands. If a user were
tricked into installing a malicious snap or downloading a malicious
library, under certain circumstances an attacker could exploit this to
affect strict mode snaps that have access to the library and when
launched from the directory containing the library.