USN-4661-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4661-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4661-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4661-1
Related
Published
2020-12-03T18:35:20.125286Z
Modified
2020-12-03T18:35:20.125286Z
Summary
snapcraft vulnerability
Details

It was discovered that Snapcraft includes the current directory when configuring LDLIBRARYPATH for application commands. If a user were tricked into installing a malicious snap or downloading a malicious library, under certain circumstances an attacker could exploit this to affect strict mode snaps that have access to the library and when launched from the directory containing the library.

References

Affected packages

Ubuntu:18.04:LTS / snapcraft

Package

Name
snapcraft

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.43.1+18.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "snapcraft-examples": "2.43.1+18.04.1",
            "snapcraft": "2.43.1+18.04.1",
            "snapcraft-parser": "2.43.1+18.04.1"
        }
    ]
}

Ubuntu:16.04:LTS / snapcraft

Package

Name
snapcraft

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.43.1+16.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "snapcraft-examples": "2.43.1+16.04.1",
            "snapcraft": "2.43.1+16.04.1",
            "snapcraft-parser": "2.43.1+16.04.1"
        }
    ]
}