github.com/snapcore/snapd is vulnerable to symlink attack. A malicious current working directory can be used to bypass permission checks on a multi-user system. The vulnerability can be exploited when snap-confine
changes the current working directory and attempts to restore the original working directory while executing with root privileges.