snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2019/04/18/4 | patch mailing list exploit third party advisory |
https://github.com/snapcore/snapd/commit/bdbfeebef03245176ae0dc323392bb0522a339b1 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2019/04/25/7 | third party advisory mailing list |