Логотип exploitDog
bind:CVE-2025-68146
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68146

Количество 6

Количество 6

ubuntu логотип

CVE-2025-68146

около 2 месяцев назад

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead ...

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2025-68146

около 2 месяцев назад

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of

CVSS3: 6.3
EPSS: Низкий
msrc логотип

CVE-2025-68146

около 1 месяца назад

filelock has TOCTOU race condition that allows symlink attacks during lock file creation

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-68146

около 2 месяцев назад

filelock is a platform-independent file lock for Python. In versions p ...

CVSS3: 6.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0082-1

27 дней назад

Security update for python-filelock

EPSS: Низкий
github логотип

GHSA-w853-jp5j-5j7f

около 2 месяцев назад

filelock has a TOCTOU race condition which allows symlink attacks during lock file creation

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-68146

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead ...

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-68146

filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-68146

filelock has TOCTOU race condition that allows symlink attacks during lock file creation

CVSS3: 6.3
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-68146

filelock is a platform-independent file lock for Python. In versions p ...

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0082-1

Security update for python-filelock

0%
Низкий
27 дней назад
github логотип
GHSA-w853-jp5j-5j7f

filelock has a TOCTOU race condition which allows symlink attacks during lock file creation

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу