First published: Sun Nov 16 2014(Updated: )
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 2.7 | =3.2.0 | |
Python 2.7 | =3.2.1 | |
Python 2.7 | =3.2.2 | |
Python 2.7 | =3.2.3 | |
Python 2.7 | =3.2.4 | |
Python 2.7 | =3.2.5 | |
Python 2.7 | =3.2.6 | |
Python 2.7 | =3.3.0 | |
Python 2.7 | =3.3.1 | |
Python 2.7 | =3.3.2 | |
Python 2.7 | =3.3.3 | |
Python 2.7 | =3.3.4 | |
Python 2.7 | =3.3.5 | |
Python 2.7 | =3.3.6 | |
Python 2.7 | =3.4.0 | |
Python 2.7 | =3.4.1 | |
Python 2.7 | =3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2667 is categorized as a medium severity vulnerability due to the potential for local users to bypass file permissions.
To fix CVE-2014-2667, you should upgrade to a patched version of Python, ideally version 3.5 or later.
CVE-2014-2667 affects Python versions 3.2 through 3.4, including all versions in between, such as 3.2.0 to 3.4.2.
No, CVE-2014-2667 can only be exploited locally by users with access to the system.
CVE-2014-2667 addresses a race condition in the _get_masked_mode function that can allow users to bypass intended file permissions.