Lucene search

K
mageiaGentoo FoundationMGASA-2014-0216
HistoryMay 15, 2014 - 2:04 a.m.

Updated python3 packages fix security vulnerability

2014-05-1502:04:31
Gentoo Foundation
advisories.mageia.org
7

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:P/A:N

0.0004 Low

EPSS

Percentile

5.2%

It was reported that a patch added to Python 3.2 caused a race condition where a file created could be created with world read/write permissions instead of the permissions dictated by the original umask of the process. This could allow a local attacker that could win the race to view and edit files created by a program using this call. Note that prior versions of Python, including 2.x, do not include the vulnerable _get_masked_mode() function that is used by os.makedirs() when exist_ok is set to True (CVE-2014-2667).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchpython3< 3.3.0-4.8python3-3.3.0-4.8.mga3
Mageia4noarchpython3< 3.3.2-13.3python3-3.3.2-13.3.mga4

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:P/A:N

0.0004 Low

EPSS

Percentile

5.2%