Bug 2058682 (CVE-2021-3155)

Summary: CVE-2021-3155 snapd: lax permissions of ~/snap directories in user home
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: go-sig, maciek.borzecki, me, ngompa13
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: snapd 2.54.3 Doc Type: ---
Doc Text:
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mauro Matteo Cascella 2022-02-25 15:37:25 UTC
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private.

snapd bug:
https://bugs.launchpad.net/snapd/+bug/1910298

Upstream PR and commits:
https://github.com/snapcore/snapd/pull/9897
https://github.com/snapcore/snapd/pull/10992
https://github.com/snapcore/snapd/commit/6bcaeeccd16ed8298a301dd92f6907f88c24cc85 (2.52)
https://github.com/snapcore/snapd/commit/7d2a966620002149891446a53cf114804808dcca (2.54)