Red Hat Bugzilla – Bug 498648
CVE-2009-1631 evolution: insecure permissions on evolution mailbox folders
Last modified: 2009-12-04 13:23:30 EST
A Debian bug report  brought to light the fact that Evolution does not
create its data files with appropriate permissions. Because of this, if user A
on a system uses Evolut ion for email, user B can read any of user A's email.
The default permissions for ~/.evolution is 0755, and the default permissions
for Evolution data files is 0644 (although s trangely enough the default
permissions for .index* files is 0600).
As well, by default in Fedora and RHEL5, a user's home directory has mode 0755 permissions.
By contrast, Firefox creates ~/.mozilla/firefox as mode 0700, protecting user bookmarks and caches.
Evolution should probably create/enforce ~/.evolution being mode 0700.
The Mailer component in Evolution 2.26.1 and earlier uses
world-readable permissions for the .evolution directory, and certain
directories and files under .evolution/ related to local mail, which
allows local users to obtain sensitive information by reading these
I'm not really convinced this is a security issue. Once you open up your home directory to other users the game's over. They can just as easily read personal financial spreadsheets or other sensitive data as they can my mail.
Note that the defaults in RHEL5 and Fedora are to create home directories mode 0755, so this is an issue by default. This isn't a user opening up their home directory; we create them opened up.
This probably wouldn't be an issue if home directories were mode 0700 by default and then the user had to relax permissions manually, but since we do this for them, I would consider it a security issue.
Hmmm... I'm looking into this further and I may be mistaken, but I can't account for why some of my home directories are mode 0755 on various systems. Taking a look at using useradd on RHEL3, 4, and 5 shows new users have home directories mode 0700 by default, and likewise on Fedora 11. On a Fedora 10 install where the home directory was mode 0755, using useradd and also system-config-user to create a new user creates them with mode 0700 permissions.
So I agree with Matthew on this issue, it's not a security issue by default and if a user intentionally opens up their home directory, they should take care to chmod 700 ~/.evolution/ if they want to keep the data private.
This may make for a good enhancement for future Evolution packages or, better yet, something that upstream would take into account (since some files are protected while others are not). Activity on the upstream bug report is non-existent.
(In reply to comment #4)
> This may make for a good enhancement for future Evolution packages or, better
> yet, something that upstream would take into account (since some files are
> protected while others are not). Activity on the upstream bug report is
Certainly it's a valid bug. We should be creating ~/.evolution with 0700 permissions. Not sure if it's worth enforcing this for existing installs.
I'm an upstream maintainer, so I'll try to get this taken care of for the next upstream stable and development releases.
Yeah, I think on Evolution's first run it would probably be enough to create ~/.evolution as 0700 and maybe do permission checks on startup or something to enforce it. I don't believe it's necessary to drill down and set umasks or anything (as suggested in the Debian bug report).
And no, I agree that this may not be worth the effort for existing installs as a mode 0755 home directory should not be default. At the very best this is a low impact issue, and we could possibly defer it for future inclusion in an Evolution update if upstream agrees this is the way to go.
Red Hat does not consider this to be a security issue. By default, user home directories are created with mode 0700 permissions, which would not expose the ~/.evolution/ directory regardless of its own permissions. If a user intentionally relaxes permissions on their home directory, they should be auditing all files and directories in order to not expose unwanted files to other local users.