Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-6507
HistoryDec 08, 2023 - 12:00 a.m.

CVE-2023-6507

2023-12-0800:00:00
ubuntu.com
ubuntu.com
18
cpython
subprocess module
posix platforms
privilege escalation
extra_groups parameter
setgroups system call
cve-2023-6507
privilege

6.1 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.7%

An issue was found in CPython 3.12.0 subprocess module on POSIX
platforms. The issue was fixed in CPython 3.12.1 and does not affect other
stable releases. When using the extra_groups= parameter with an empty
list as a value (ie extra_groups=[]) the logic regressed to not call
setgroups(0, NULL) before calling exec(), thus not dropping the
original processes’ groups before starting the new process. There is no
issue when the parameter isn’t used or when any value is used besides an
empty list. This issue only impacts CPython processes run with sufficient
privilege to make the setgroups system call (typically root).

Bugs

Notes

Author Note
mdeslaur only affects 3.12.0, no earlier releases
OSVersionArchitecturePackageVersionFilename
ubuntu23.10noarchpython3.12< anyUNKNOWN

6.1 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.7%