Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-4030

Опубликовано: 07 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.1

Описание

On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.

РелизСтатусПримечание
devel

DNE

esm-apps/focal

not-affected

Windows Only
esm-apps/jammy

not-affected

Windows Only
esm-infra-legacy/trusty

not-affected

Windows Only
esm-infra/bionic

not-affected

Windows Only
esm-infra/xenial

not-affected

Windows Only
focal

not-affected

Windows Only
jammy

not-affected

Windows Only
mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

Windows Only
mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

Windows Only
mantic

not-affected

Windows Only
noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

Windows Only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

not-affected

Windows Only
noble

not-affected

Windows Only
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

Windows Only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

trusty/esm

not-affected

Windows Only
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

Windows Only
esm-infra/focal

DNE

esm-infra/xenial

not-affected

Windows Only
focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

trusty/esm

not-affected

Windows Only
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

Windows Only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

Windows Only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

Windows Only
esm-infra/focal

not-affected

Windows Only
focal

not-affected

Windows Only
jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/focal

not-affected

Windows Only
focal

not-affected

Windows Only
jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 3%
0.00018
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
около 1 года назад

On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.

CVSS3: 7.1
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 7.1
debian
около 1 года назад

On Windows a directory returned by tempfile.mkdtemp() would not always ...

CVSS3: 7.1
github
около 1 года назад

On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.

CVSS3: 7.1
fstec
около 1 года назад

Уязвимость функции mkdtemp интерпретатора языка программирования Python, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 3%
0.00018
Низкий

7.1 High

CVSS3

Уязвимость CVE-2024-4030