Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-68146

Опубликовано: 16 дек. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.3

Описание

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead ...

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

released

3.0.4-1ubuntu0.1~esm1
esm-apps/focal

released

3.0.12-2ubuntu0.1~esm1
esm-apps/jammy

released

3.6.0-1ubuntu0.1~esm1
esm-apps/noble

released

3.13.1-1ubuntu0.1~esm1
jammy

needed

noble

needed

plucky

ignored

end of life, was needs-triage
questing

needed

upstream

needs-triage

Показывать по

EPSS

Процентиль: 0%
0.00004
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
redhat
3 месяца назад

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead ...

CVSS3: 6.3
nvd
3 месяца назад

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of

CVSS3: 6.3
msrc
3 месяца назад

filelock has TOCTOU race condition that allows symlink attacks during lock file creation

CVSS3: 6.3
debian
3 месяца назад

filelock is a platform-independent file lock for Python. In versions p ...

suse-cvrf
3 месяца назад

Security update for python-filelock

EPSS

Процентиль: 0%
0.00004
Низкий

6.3 Medium

CVSS3